Download presentation
Presentation is loading. Please wait.
Published byCody Atkins Modified over 8 years ago
1
Stephan Bayer September 9, 2004 INLS 187
2
What is it? War Driving Software – WarDriving v. The benign act of locating and logging wireless access points while in motion. Access Point (AP) Identification Software
3
Its Purpose Allows you to map out vulnerable APs for future use or pinpoint them for hardening
4
Not a “Sniffer” or WEP Cracker Originally released as a tool that analyzed the 802.11 header and IV fields of packet to determine – SSID – MAC address – WEP Usage – WEP Key length (40 or 128 bit) – Signal range – Access point vendor
5
Acronyms of things this software looks for SSID (Service Set Identifier) MAC (Media Access Control) IV (Initialization Vector) WEP (Wired Equivalent Privacy) The IV of a WEPpacket is included after the 802.11 header and is used in combination with the shared secret key to cipher the packet’s data
7
War Driving Set-Up
9
GPS Netstumbler will detect relative position of APs with GPS Records GPS coordinate for the highest signal strength found for each access point Can be used to create maps Publish your maps to the web!
10
How it works Probe Request sent to broadcast destination address Response from APs contain network configuration information SSID WEP status etc
11
Instructions Download and install NetstumblerNetstumbler Set SSID or Network Name to ANY Start Netstumbler and click on the green arrow on the toolbar
13
Filters WEP usage IBSS or BSS type network IBSS – group of systems without AP – Not good to use as a bridge to internal LAN
14
Weaknesses Relies on one form of wireless network detection – Broadcast Probe Request Wireless vendors offer an option to disable the 802.11 feature on APs
15
Conclusion AP identification software – Can actually be used to set up your home network Used for War Driving Not illegal, but ethics are questioned Sources: Hacking Exposed, Google Image Search
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.