CEH

(Jeff_L) #1

What Is a Wireless Network? 365


Also note that in addition to traffic analysis some tools offer the ability to
perform spectrum analysis. This means that the user can analyze the RF
spectrum of wireless networks and devices. In the right hands, these tools
can detect issues with frequency, channel overlap, and performance, as
well as help locate devices other than access points that may be in range.

Choosing the Right Wireless Card


The subject of wireless cards and chipsets is important. Although in many cases the chipset
on the card and the wireless card itself may not matter, some tools require the presence of
certain chipsets in order to function.
Items to consider include:


■ Operating system in use.


■ Application in use.


■ Whether packet injection is required (Windows systems cannot perform packet


injection; if this is required then Linux must be used).

■ Driver availability.


■ Manufacturer of wireless card and chipset (you must know both because the two can


be made by two different manufacturers).

■ If you are using virtualization, you may also need to check to see if your card will work


with this environment.

In the real world the biggest deciding factors on many wireless penetration
tools are not type of card and chipset. Consider compatibility with Linux,
because some tools for wireless auditing (for example, BackTrack or Kali)
may only be available on the Linux platform. Make sure the card you
choose has Linux drivers available.

Another deciding factor is if the card is USB or PCMCIA, or whether it is
built into the actual hardware. Each situation could cause some problems
with some software.

One last thing to consider is that some hardware such as Riverbed
Technology’s AirPcap can only be run on Windows or on other specific
environments.

Hacking Bluetooth


Another wireless technology to consider is Bluetooth, which is seen in many mobile devices
in today’s marketplace. Bluetooth refers to a short-range wireless technology commonly

Free download pdf