Wardriving for Wi-Fi
Chris Burchett doesn't look like a malicious hacker. He pulls up in a shiny SUV, walks up to my front porch and gives me a fresh-faced grin and handshake.
It shouldn't surprise me that Burchett doesn't look like a malicious hacker. He isn't one. He's a perfectly respectable technical services manager for BOLDstreet Inc., a perfectly respectable local wireless startup.
But we're about to go wardriving, and there's a tinge of the unsavoury to that. Wardriving is the term used in wireless technology circles for driving around, looking for networks operating on radio frequencies.
Some wardrivers hack into the networks they find. Wardriving has attracted a lot of attention recently, so much so that many Wi-Fi enthusiasts fear it will unfairly taint the image of wireless technology.
Sgt. Chuck Scott, of the RCMP's technological crime unit in Ottawa, says no reliable statistics exist on Wi-Fi malicious hacking in Canada, mainly because many victims don't report the incident. But there's no denying the hacker appeal of wireless networks that ooze out of the buildings where they're based.
[ Read more ]
For all your wireless security information needs, visit the Wireless outside articles section of HNS.
- Software: Kismet
- Software: AirSnort
- Software: Fake AP
- Software: WifiScanner
- Software: PrismStumbler
- Software: Wellenreiter
- Article: Wireless LAN Security (5 November 2002)
- Article: Wireless Security Threats (9 October 2002)
- Software: APTools
- Article: Hacking the Invisible Network: Insecurities in 802.11x (31 July 2002)