This chapter has covered a variety of ways hackers can use the Linux platform as a basis for conducting wireless hacking/auditing as well as how they can create their own hardware to augment their hacking/auditing capabilities.
Due to the nature of specialized operating modes being required for certain activities such as RFMON operation and frame injection, this chapter has also delved into the native hardware and driver combinations that are necessary for any kind of hacking activity to be effected using a Linux platform.
Even more important is the need for wireless network administrators to understand the ins and outs of RF and the higher layer protocols that their wireless networks are using, simply because attackers always start off with understanding the specifications before determining how they can exploit them. Further help in understanding RF and EMR can be found in the OSSTMM and the OWSE, both available at http://www.isecom.org.
This page intentionally left blank
Was this article helpful?
Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.