Skip to Content
Wireless Hacks, 2nd Edition
book

Wireless Hacks, 2nd Edition

by Rob Flickenger, Roger Weeks
November 2005
Intermediate to advanced
466 pages
12h 40m
English
O'Reilly Media, Inc.
Content preview from Wireless Hacks, 2nd Edition

Chapter 3. Wireless Security

Hacks 40–51: Introduction

When it comes to wireless networking, there is no such thing as physical security. You might be able to lock down the physical network infrastructure of a business or other facility, but radio waves pass through walls, carrying your network data with them. Don’t delude yourself by thinking that a low-powered access point (AP) won’t reach much further than your parking lot. Remember that although you might not see your network while using a laptop outside your building, someone with a large enough antenna can likely read your network traffic from a mile or more away.

I have personally seen a simple 24 dBi dish detect hundreds of wireless networks from the top of Queen Anne hill in Seattle. These were networks with SSIDs like Linksys and default, which obviously were coming from low-end, consumer-grade access points without any external antennas. I certainly couldn’t have made a reliable network link to them, but I could have passively logged their traffic from miles away quite easily. Short of wrapping your entire building with a metal screen to build an effective Faraday cage, you should expect the signal of your APs to leak out well beyond your immediate vicinity.

This chapter is devoted to workable methods for controlling access to your wireless network. A control mechanism could be something as simple as a WPA key, or as complex as a captive web portal with a RADIUS backend. We will also look at several ways you can protect ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

Wireless Hacks

Wireless Hacks

Rob Flickenger
Hacking Exposed Wireless, Second Edition, 2nd Edition

Hacking Exposed Wireless, Second Edition, 2nd Edition

Johnny Cache, Joshua Wright, Vincent Liu

Publisher Resources

ISBN: 0596101449Errata Page