X hits on this document





12 / 16

With Kismet, you have another option for visualizing your wardriving data. A Linux program, gpsmap, is bundled with Kismet. Given a Kismet GPS file, gpsmap will download a map from Expedia, Mapblast, and Terraserver and plot the wireless access points. Gpsmap also allows you to visualize the route taken during the wardriving session.

Key ingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46

Figure 6: Gpsmap, included in the Kismet package, from http://www.kismetwireless.net/screenshot.shtml

VI. Two Methods of Detecting Wardrivers

© SANS Institute 2002, Author retains full rights.

Now that you are familiar with the hardware and software that wardrivers use to detect wireless access points, I will discuss two methods that could be used to detect passing

K e y i n g e r p r i n t = A F 1 9 F A 2 7 2 F 9 4 9 9 8 D F D B 5 D E 3 D F 8 B 5 0 6 E 4 A 1 6 9 4 E 4 6 w a r d r i v e r s . T h e f i r s t m e t h o d i s o n l y e f f e c t i v e i n d e t e c t i n g u s e r s o f N e t S t u m b l e r . T h e s e c o n d m e t h o d c a n b e u s e d t o d e t e c t u s e r s o f N e t S t u m b l e r , M i n i S t u m b l e r , a n d MacStumbler. Since Kismet is a passive scanner, these methods cannot be used to detect users of that program.

© SANS Institute 2002,

As part of the Information Security Reading Room.

Author retains full rights.

Document info
Document views62
Page views62
Page last viewedSat Jan 21 21:42:57 UTC 2017