Welcome to a Tip From JukE : Rep points are nice if you think this forum helped
Interdiction
This is not about hot to setup network but how to use the network to your control.
Start:
War Driving is possible because of the flaws in 802.11
802.11 will receive any signal that is within its broadcast range. This means that any network card that is within 18 n 30 foot radius of a wireless access point, will in theory be able to access the network from which the point is set up. Currently there are number of deferent methods of preventing access to wireless networks.
One is through using wireless encryption protocol or WEP, as I will tell you within this post. This form of security is not the only answer. Wireless encryption protocol encrypts the packets that the network sends out, if a person does not have the specific wireless encryption protocol key then in theory they will be unable to access the data. Unfortunately do through enough analysis of are traffic it can be guessed by certain software products.
Another method is by using a radius server, this server acts as if a domain controller for a wireless network. A combination of both of these security measures provides the tightest form of security.
The question you may be asking yourself is, "why would someone wont to do this?". The first and most innocent reason is simply to gain free internet access. The second is to use your network as a jumping point to commit other computer crimes. their identity will then be hidden behind your network, escaping prosecution.
Here are a list of tools that I know there using...
1. Airsnort
2. Kismet
3. Scanchan
4. Arpping
The computer Criminals will use these tools, to break the encryption on your network and gain access to the network and its bandwidth. Here is where you can find copies of these tools
1. Airsnort AirSnort Homepage
2. Kismet Kismet
3. Scanchan http://team.vantronix.net/reyk/prism2/
4. Arpping http://busybox.net/cgi-bin/cvsweb/udhcp/...le#dirlist
Technically you can go and start war driving at this moment. but you remember when I said that you must be within 18 n 30 foot?
So, to increase the effectiveness of out audit policy, we will add an additional antenna to out wireless LAN card. Not every car that's available market is ready to have a external antenna attached. So some cards will require a bit of soldering and other modifications.
So go and buy a card with an external Antenna mount jack.
Here is a link on how to build such a device How to build a tin can waveguide antenna
End
============
Tomorrow I will Talk about how to test out your own network to make shore it is good to go.
Interdiction
This is not about hot to setup network but how to use the network to your control.
Start:
War Driving is possible because of the flaws in 802.11
802.11 will receive any signal that is within its broadcast range. This means that any network card that is within 18 n 30 foot radius of a wireless access point, will in theory be able to access the network from which the point is set up. Currently there are number of deferent methods of preventing access to wireless networks.
One is through using wireless encryption protocol or WEP, as I will tell you within this post. This form of security is not the only answer. Wireless encryption protocol encrypts the packets that the network sends out, if a person does not have the specific wireless encryption protocol key then in theory they will be unable to access the data. Unfortunately do through enough analysis of are traffic it can be guessed by certain software products.
Another method is by using a radius server, this server acts as if a domain controller for a wireless network. A combination of both of these security measures provides the tightest form of security.
The question you may be asking yourself is, "why would someone wont to do this?". The first and most innocent reason is simply to gain free internet access. The second is to use your network as a jumping point to commit other computer crimes. their identity will then be hidden behind your network, escaping prosecution.
Here are a list of tools that I know there using...
1. Airsnort
2. Kismet
3. Scanchan
4. Arpping
The computer Criminals will use these tools, to break the encryption on your network and gain access to the network and its bandwidth. Here is where you can find copies of these tools

1. Airsnort AirSnort Homepage
2. Kismet Kismet
3. Scanchan http://team.vantronix.net/reyk/prism2/
4. Arpping http://busybox.net/cgi-bin/cvsweb/udhcp/...le#dirlist
Technically you can go and start war driving at this moment. but you remember when I said that you must be within 18 n 30 foot?
So, to increase the effectiveness of out audit policy, we will add an additional antenna to out wireless LAN card. Not every car that's available market is ready to have a external antenna attached. So some cards will require a bit of soldering and other modifications.
So go and buy a card with an external Antenna mount jack.
Here is a link on how to build such a device How to build a tin can waveguide antenna
End
============
Tomorrow I will Talk about how to test out your own network to make shore it is good to go.