Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Wireless Networking Books Media The Internet Book Reviews Hardware

Wireless Hacks 134

hanksdc writes "With the proliferation of wireless networking over the past year, it has become easier and easier for even the most budget-minded geeks to afford wireless gear for their homes, offices, and neighborhoods. Rob Flickenger's latest, Wireless Hacks expands upon his previous book on the topic, Building Wireless Community Networks , and takes its reader by the hand on a fast-paced run through a large assortment of hacks related to wireless networking." Read on for the rest of hanksdc's review.
Wireless Hacks
author Rob Flickenger
pages 286
publisher O'Reilly
rating 8
reviewer hanksdc
ISBN 0596005598
summary Tips and Tricks for getting the most out of your wireless network

From the back cover we find that the book is targeted towards the intermediate to advanced wireless user, and I found that definitely to be the case. Some of the hacks use a lot of technical jargon, and assume a fair amount of background knowledge from the reader. You should probably already know how to get a wireless link up and running to really benefit from the book. But don't let that be a deterrent if you're a newbie. It's still a fun read, and provides a lot of ideas for the inquisitive and creative mind.

The book is very readable, (all the Hacks series books I have read would, like their venerable ancestor, UNIX Power Tools , make for great bathroom books). Each hack is self-contained, and can be read in just a few minutes. You can read the book straight through, or browse around, find what interests you and go from there. Most hacks have references to other hacks in the book, so reading it can be like browsing a web page sometimes. Many hacks also have references to further sources of information on the topic covered.

There are hacks here for UNIX/Linux platforms mainly, but all you Ti/Al-Powerbook zealots will find plenty to lick your lips over as well, with several of the hacks devoted to wireless networking with OS X. There are even some for the Windows users as well. Many of the hacks (since they deal with hardware) could be utilized on any platform. Well, ok, you might have a bit of a hurdle to get your Pirouette cantenna hooked up to your vintage Apple ][c, but this book makes a good breeding-ground of ideas for those so inclined.

The book is divided into several chapters, each devoted to a particular topic. Each chapter contains a number of hacks related to that topic:

  • Chapter 1, "The Standards," covers the alphabet soup of current wireless protocols, with a brief introduction to each.
  • Chapter 2, "Bluetooth and Mobile Data," covers Bluetooth technology (need to use your Bluetooth-enabled cell phone to act as a modem for your laptop in a pinch? If only those phones weren't so pricey...*sigh*)
  • Chapter 3, "Network Monitoring," is all about finding out what's going on on the local network, including various ways to sniff traffic, broadcast network services, perform network discovery, and analyze traffic.
  • Chapter 4, "Hardware Hacks," gets down to the metal, discussing topics ranging from boosting signal strength to building your own access point from micro form-factor hardware to cabling and antenna guides.
  • Chapter 5, "Do-it-Yourself Antennas," describes various ways to build your own antennas all the way from Pringles cans to milled aluminum wave guides (Don't forget to use ventilation when soldering ;-).
  • Chapter 6, "Long distance Links," offers tips on setting up, well, long distance wireless links.
  • Chapter 7, "Wireless Security," dispels the vendor-propagated myths of WEP 'security,' and gives practical advice on how you can avoid the guy next door from sniffing your private traffic (not that you'd have anything to hide, of course...).
The book's website has a full table of contents, listing each hack, if you're interested.

Throughout the book there is a lot of information repeated from Building Wireless Community Networks, as well as a few hacks copied over from Linux Server Hacks [Slashdot review here], but all together it makes a very useful collection, and a nice addition to O'Reilly's Hacks series.

So what's my take on it? If you're doing just about anything with an 802.11x network, you'll likely find something fun or useful here. If you're brand new to wireless networking, you may want to come up to speed with something a bit more tutorial-oriented. Perhaps one drawback to the book is its recipe-style format. There's not a lot of background information offered with each hack, but rather a lot "do this, then this, and you get this." If you're not used to hacking and experimenting with things, you might find yourself a bit lost. It certainly isn't a college textbook, which can be both good and bad, depending on what you're looking for.

Overall, if you're the forward-thinking, range-extending, hardware-tinkering, soldering-iron wielding, average slashdot reader, you'll probably find it a fun read with lots of good ideas to offer.


You can purchase Wireless Hacks from bn.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.

This discussion has been archived. No new comments can be posted.

Wireless Hacks

Comments Filter:
  • by Sir Haxalot ( 693401 ) on Tuesday October 21, 2003 @01:18PM (#7272415)
    is also a useful book [slashdot.org] on the subject, covering 'a few scenarios involving wireless access that each manage to point out a different facet of wireless security.'
  • www. no cat . net (Score:4, Informative)

    by fluor2 ( 242824 ) on Tuesday October 21, 2003 @01:18PM (#7272426)
    We use nocat ( www.nocat.net ) at work. Its free, its open source, and it is highly customizeable.
  • Speaking of wireless (Score:4, Interesting)

    by Anonymous Coward on Tuesday October 21, 2003 @01:21PM (#7272460)
    I live pretty close to a Starbucks with wireless. Has anyone had any experience using their service from home? Can you do it? Is it worth it? Do they leave wireless on when the store is closed?
    • Driving past there at night running Kismet, the SSID is still broadcast. I'd have to guess yes.
    • They are TMobile Hotspots [t-mobile.com]. Not free [t-mobile.com].
    • I live about 500 feet from one - no access from home, but I haven't done the antenna thing.

      Could someone with more better smarts than I explain me this:

      I have a monthly hotspot subscription, with my cell phone. I was wondering how hotspot works... I can resolve network names (ping cnn.com will come back allright) before I log in but the web browser always points me to the t-mobile login screen. Also, I don't see anyone else on the network once I log in.

      I ran ethereal during a login session, and didn't
      • You probably are resolving name lookups, but I'll bet what you are seeing one of two things:

        1. They set a wildcard in their DNS server, so every query returns the same IP address, probably of their authentication server.

        or

        2. They have an HTTP proxy server that intercepts everybody who is not authorized for access, and then the DNS could still function normally.

        The problem with number two is then in theory, if DNS queries still work right, then SSH, POP3, IMAP, etc probably works fine, and that would def
        • 2. They have an HTTP proxy server that intercepts everybody who is not authorized for access, and then the DNS could still function normally.

          They could redirect all outbound connections to a proxy, no matter what it is (it would just break the protocol).

          If you're using their DNS server, then you would still resolve names, but even your SSH or POP3 connections would be redirected to the proxy and fail.

          I think I saw something working in this fashion somewhere...

          • I don't know how Starbucks does it in particular, but I've seen several different setups. Often times the authentication is done at the DHCP server, where a temporary IP on a network with no net access is assigned to unauthenticated clients, and an IP on the net-connected network is assigned once you have authenticated and restarted your network connection. On campus here @ WSU, your wifi will pick up a good IP but the only route to the internet is through a VPN tunnel you have to authenticate with, and loa
          • I hate to sound like the village idiot, but doesnt borders run on the same setup? Like using the t-mobile hotspot? Cause maybe the setup where i live is screwy but i can get on their wireless network without having to pay, ive only tried it using linux.
    • My office is on several lower floors (8-10) of a building in the downtown area of a really big city with a crappy football team. There's a Starbucks diagonally across the street at ground level, probably 500 feet away.

      I was running a netStumbler scan for rogue APs, and I was able to see the T-Mobile network inside Starbucks, even after it was closed. I got a signal that would have been good enough for a 1 mbps connection from about 1/2 of every floor. And this with the punk-ass built-in "tab" antenna on a

    • They charge by the hour, unless you steal it :P (see AirSnarf [shmoo.com] )

      The DefCon presentation describes their authentication setup, IIRC.

  • by GillBates0 ( 664202 ) on Tuesday October 21, 2003 @01:23PM (#7272477) Homepage Journal
    Overall, if you're the forward-thinking, range-extending, hardware-tinkering, soldering-iron wielding, average slashdot reader, you'll probably find it a fun read with lots of good ideas to offer.

    ...woman-fearing, microsoft hating, RIAA loathing, SCO bashing, tinfoil hat-wearing, troll-posting, penguin-loving, overlord-welcoming, beowulf-clustering, and russia-sovieting slashdot readers? Will we find it a good read too?

  • I'll just toss in my $.02

    Working for a company where security is of the utmost concern, I don't see 802.11 taking over anytime soon. While the speeds and reliability are getting better, it's still just too easy to find a way in. Not broadcasting the link help, but even that's not foolproof for people who know what their doing.

    I don't know if you'll ever see this sort of technology in main stream business, but for home Lan's it sure is cool. Personally however, I'm just not a big fan of even thi
    • by lanswitch ( 705539 ) on Tuesday October 21, 2003 @01:31PM (#7272574)
      In the Netherlands there is an experiment going on with WIFI, www.wirelessleiden.nl

      Right now I can use the 'net all around the center of the city I live in, Leiden (of Pilgrims fame). In a few months a commercial ISP will provide internet access through the wifi-network. Quite how they want to make profit, I don't know. Still, it's cool to walk with my Ipaq (opie linux) in my hand and see all the networks around me. Most people just think I'm playing with some pda or gameboy.

    • Are talking about sharing your bandwidth, or sharing the cost? Because Speakeasy has a setup where you can share your cable connection with a neighbor, and they will handle the billing.

      Too bad I can only get Roadrunner. My neighbor has Roadrunner also, but they are home at different times of the day and really just use it as a faster AOL so they don't have to wait so long for pages to load. For a 50% reduction in costs, I'd probably see barely a 5% reduction in service.
      • Last I heard they would let you do it, but you had to handle the billing. It's still nice, most places don't want you to do that at all.

        Have they changed their service or somesuch?

        -Zipwow
    • While you are right to be concerned about the security aspects of 802.11 I think that the situation will improve before too long.

      The current problem is that wireless cards work by broadcasting the signal out over a sphere, typically having a radius of around about 100m. This is great in that neither the transmitter or the receiver need to have much spatial directionality, however it meansd that anybody within that radius can tap into your traffic and start breaking any encryption you hyave going.

      Now
      • Last year at the WERN conference in Geneva I saw IBM demonstrate something along these lines which instead used muon and tau neutrinos to transmit data to their research facility in Kuala Lumpur. Because of the weak interaction with baryonic particles, they could use a line of sight path completely below the surface of the earth, so very secure. Although the helical magnets they used in the accelerator were relatively small, they said this would have to be a solution only for fixed wireless because of pow
    • I am the Sys Admin at a small financial institution and I don't allow wireless on any of my laptops for this very reason. It's way too easy to find a way in, and I have no control over anyone's home setup. And, as we all know, hacking Windows is trivial.
    • I agree. Its amazing how people here blast MS, claiming lax security, but they blissfully use and promote 802.11 I guess bad security is ok as long as it allows us to view pr0n in the bathroom.
      • We know WEP is lax security too. Enough to stop the casual wardriver, but supplemental encryption is needed for really valuable data. It's a pain in the ass, but if you can't do anything else, rekeying after about every 1GB of data will reduce the risk.
        • Im just restricting access by MAC addresses. There are ways around that, too, and it doesnt prevent eavesdropping, but at least its a bit better.

          Maybe Ill just see about setting up a VPN here...

    • I don't know why companies don't set up more in office guest friendly networks along side their intranets. Wi-Fi would be the perfect medium for them. I have been in sales and consulting for many years and am often on-site there at my customers/prospects completely cut-off from the rest of the world and not as productive as I could be just because it is too much of a bother to give me real network access.

      My needs are small:

      • HTTP
      • POP/IMAP
      • VPN
      • SSH
      • Printer

      I mean, you let me into security without checking for f

    • I love getting modded offtopic for discussing the problem at hand...

      802.11 is easy to hack, too easy. Scanning for unprotected networks is childs play, and even for someone who know's what they are doing, it still can't be protected enough to use as a viable option.

      I have salesmen going crazy because I won't give in to the push of a wireless connection, but when you're dealing with a financial institution, and countless amounts of other people's money, it's just not an option.

      Getting into th
    • What exactly is wrong with using wireless and nly allowing VPN connections to do anything? Preferably with something like X509 certificates and good strong crypto? Yeah they can find your link but they can't do anything with it. :-)
    • unless you encrypt your traffic end to end.

      SSH tunnels are so useful.
  • Why Wireless? (Score:5, Insightful)

    by Eberlin ( 570874 ) on Tuesday October 21, 2003 @01:24PM (#7272492) Homepage
    I'm questioning the purpose of wireless technology. I understand that it's more convenient than a wired network but is there anything else?

    Unless you've got an office full of notebooks, the best solution still seems to be a mixture of both wireless and wired...with wireless locked down as much as possible (even to the point of having to VPN through to the internal network).

    It's fairly scary that one of the main reasons people go wireless if for convenience (and supposed simplicity for home users) -- and it's these same home users that will probably not take the time and effort to learn how to secure their network.
    • Re:Why Wireless? (Score:3, Insightful)

      by Tumbleweed ( 3706 )
      I'm renting a room in a house - we can't run cabling since it's not our space, thus, wireless, no choice.

      Is this that hard of a concept? Sometimes cabled just isn't an option.
      • [i} thus, wireless, no choice.[/i][P] Actually, you still have choices. There are, for example, devices that let you send your ethernet across the AC power connection. It would let you share an ethernet connection in other rooms of the house, but not past the transformer that feeds the building. There may be security issues here too, but it would generally be much more secure than WiFi. That's not to say I advocate it (although I've seen it used well in one business where I would have had a fit if they had
    • Re:Why Wireless? (Score:3, Insightful)

      by Matey-O ( 518004 ) *
      #include(You_Are_New_Here_arent_You.h)

      If the bandwidth is adequate, you have ZERO cost in moving a wireless office from point A to point B.

      Wireless has been a GODSEND in/under/around Hotel conferences (the SANS security conference was REALLY cool: Track 1 was how to hack, Track 3 was how to catch the hackers...the wireless packets came rapidly and were Very Interesting.)

      Any traveler with a reasonably secure setup has an office just about anywhere he opens the lid on his laptop.

      Why wireless? If you spent
      • Why wireless? If you spent ANY TIME with a wireless system? Ever find that Cat5e cable you ran thru the walls at home is No Longer Necessary?

        Yes, I have wireless at home. No, I've never found that the cat5e I ran (2 totally independant networks) is no longer necessary. Ever transferred 10GB of MP3s over your 802.11b?

        Mark
    • Imagine a warehouse. The guy walking through the racks taking inventory can be online, hooked into the inventory db. The same db that the order takers are hooked into.

      Or an oftused conference room. Don't have to have a rat's nest of wires growing out of the floor to each seat.

      You're right. A mix of wire/wireless is best. Use the wireless only when you need to. But that still leaves open the possibility of holes in the system.
    • by Anonymous Coward
      You can take your laptop to the toilet with you and surf the web. I thought everyone knew this.
    • I am wireless at home because
      1. We have computers for many people.
      2. I do not want wire all over the place becuase it does look ugly. And punching holes in the walls is more trouble than its worth.
    • Why wires? (Score:3, Insightful)

      by bluGill ( 862 )

      I question wired networks. They make sense for servers and backbones. For most users though, wires to the desktop do not make sense. Copper isn't free, and you have to pay someone to run the wires to each desktop. Hope you run enough wires too, or you will pay him to go back latter when one guy comes up with a good reason to run 3 computers in his cube. (I've known several good reasons to do this) Of course you could run more wire to each cube just in case, but then your costs have gone up a lot more.

      • by Anonymous Coward
        If your application and network has absolutely no need whatsoever for security against outside intruders and you welcome all comers to your network, then yes, consumer-grade 802.11b wireless hardware is a valid tool for the job.

        Also if it is not important to you at all that your network access stays maximum reliable..., that you are happy when it works and and don't mind random and capricious outages and packet loss due to microwave ovens and other devices in the 2.4GHz range interfering with the wi-fi har
      • Run wireless

        Isn't that an oxymoron?

      • Why would you need to run more wires to the cube for 3 machines? I've four, and they all hang nicely off of a Netgear hub.

        Maybe if all 3 were on different networks.....

        I think wireless is more for laptops than anything else, as you have to have a power line for the desktops anyway, and they don't move much.
        • Management and network design. You can only have so many hubs on a network, at most 4 between any two points (you can have more if you use a tree design, but you still can't get very many) Allowing hubs in cubes makes it that much harder to design your wiring. (With switches this isn't quite as bad as it was when I first encountered people wanting more computers in their cub than IS wired for)

          Management is the next problem. Managed hubs give IS some abilities they really like, but managed hubs are more

          • True, true. I should have said switch. I'm using a netgear Switch, and it seems to work well.

            I just like the looks of little wires, they're so cute...
    • I'm questioning the purpose of wireless technolog

      Too many apps to mention. You need to think this through.

      it's these same home users that will probably not take the time and effort to learn how to secure their network.

      Sometimes the paranoia around here is so thick you can smell it.

      Most of the people you are concerned about probably were hooked up direct to cable internet on a win98 box before they went wireless. Is it really that much worse to have an unsecured or poorly secured WLAN?
      • To not secure a system is very bad as it is. To then add complexity to it (and invite friendly neighborhood teenybopper script kiddies) can't be healthy.

        Think about it -- not only can you have your machine exposed to the Internet on a dedicated line, you now also allow drive-by access to your internal network, and can act as a proxy to anything they may want to do online. Neat, huh?

        When someone ignores security issues, they not only fsck themselves, they also fsck up the people around them. Cleaning up
        • I generally agree with what you say, but I think the point I was trying (poorly) to make is that there are two separate issues here:

          1. Clueless users.
          2. Insecure technology.

          Put the two together and you have problems. The supply of clueless users is endless and growing. In a few years there will be BILLIONS of new internet users around the planet.

          Technology companies will continue to make the same tradeoffs they have been making-- if it's insecure it's easier to support.

          WLAN is just one more example of i
    • Here why I use wireless at home: my fiance lives one story up, 2 apartments over. We have HSI into her apartment then I can access it with my Airport card down in my apartment. I then secure it by only allowing my ethernet card on to the WiFi network via MAC address and a WEP password.

      Office - we have 8 employees using 10 macs with airport and share a Cable internet connection into the office. We just moved in last week and it was $90 for a router and it would have been about $800 to have someone come

    • You must be new around here. If it wern't for wireless, some of us would never go outside ;-)
    • You try wiring a split level home. It's not built like an office building. You have to drill holes in wood. You crawl around in a hot attic struggling with a flashlight and a roll of cable. You get fiberglass insulation in the most uncomfortable places. You do a shitty job. You fall through the ceiling.

      Trust me, wireless is a lot easier.
    • I am a techie in an office full of "furniture movers". Wireless had done wonders for us. I could have spent a small fortune on wiring and rewiring in the past year had it not been for that sweet little box.
  • The Linksys WRT54g basestation/firewall/router/toaster is a MIPS box with 16mb of ram and linux...

    This guy's got snort running on it:http://www.batbox.org/wrt54g.html (with a remote nfsmount for logs)

    and these guys have info on hackin 'em:
    http://www.seattlewireless.net/index.cgi/Lin ksysWr t54g

    (I'm lazy, look out for the spaces)
  • same price at amazon (Score:1, Informative)

    by Anonymous Coward
    Ref: Amazon has this book for the same price as bn [amazon.com]
    Spend $7.50 more to get free shipping.
  • by Slashdolt ( 166321 ) on Tuesday October 21, 2003 @01:38PM (#7272639)

    I read this [oreillynet.com] article awhile ago. Given that so many people are setting up wireless networks in their homes/apartments, it really makes me wonder how many of them are being hacked, and allowing their neighbors to get free Internet access.

    On the other hand, it could be a good defense if you actually wanted to give your neighbor free access. ;-)

    --
    Slash

    • When I first got my wireless card, I intended solely to use it at school where they had wireless networks, but when I plugged into my laptop at home (a condo), I picked up a signal. Someone across the street in a neighbouring condo has a wireless lan. I was curious as to how security minded people were when installing a WLAN. I noticed both no admin password on the compaq router and some open windows shares had no passwords. More importantly, I found out I had downloaded more surfing the net wirelessly
    • Hacked? I left mine open on purpose. I'm not using most of the bandwidth anyway, so why keep it locked up?

      -Mars
      • I totally agree. My neighbours are welcome to tap any bandwidth they might care to use. It's only common decency. Christ, one of these days they might even by a computer.
      • Funny that you mention that. I am literally typing this inside a Subway eating dinner while sharing a broadband DSL connection that is being piped to me by an eye care (actually called ICare) outlet two doors down!

        Ijust turned on my laptop to write a letter and my console indicated a connection. How nice for them to offer this to anyone.
    • This reminds me of a story on /. recently about how poorly Windows is setup when one takes the defaults (Administrator account with no password, etc.). A friend of mine recently tapped into a neighbor's wireless LAN by accident (Hey, that address isn't in my IP range!). It took only a few minutes for him to access the neighbor's router (default admin account and password) and to map her c:\ drive and install VNC remote control software. I mean really, you don't even have to know how to hack anymore! But
    • by peter_gzowski ( 465076 ) on Tuesday October 21, 2003 @03:06PM (#7273729) Homepage
      A guy I do computer work for actually accidentally hacked his neighbours wireless network. His wireless network that I set up for him (with a WEP key, for what it's worth...) went down because somebody reset the box, but his laptop upstairs just picked up another network and started using it. He wouldn't have even noticed except the signal strength was poor, so his interent was slow.
      • Call me pedantic, but that's two incorrect uses of the word "hacked". The normal operation of a wireless equipped laptop connecting to a base station can hardly be described as bypassing security. And the term for bypassing security is "cracked", not "hacked". Hacking is building things, cracking is breaking them. :-)
    • >it really makes me wonder how many of them are being
      >hacked, and allowing their neighbors to get free
      >Internet access.

      If your network isn't wep encrypted then "hacked" is probably an exaggeration.

      • WEP is not encrypting your connection. While the key work involves something that might be considered 'encryption', once the key is set, it does not encrypt ANY traffic on the lan.

        Saying 'isn't wep encrypted' is a misnomer.

        WEP
        Wired Equivalent Privacy (WLAN)
  • I work for a very small private school and we have a wireless lan connecting two wired lans (we have 2 buildings). It works out great because I convinced my boss to FINALLY let me get cable here so that I could share it with the other building. Its great for me, the rest of the school has to suffer with the slow speeds, its still better than the AOL they had.
    I've often wondered if any of our school's parents are smart enough to come up here with a laptop to try to get into the network, I'm not that worrie
    • Go ahead and get your wireless. The popular routers come with the ability to encrypt your band, making it impossible for *most* people to use your bandwidth. It is unlikely that you'll actually run into someone that will both be able to hijack your signal and be willing to. Just choose a good pass phrase when you generate your encryption key.
  • Here's something I've wondered about - is it possible to connect a wire from the antenna port on my base station to the inside phone wiring of my house, and will the inside wiring act as an antenna of any sort?

    I've also wondered about connecting it up to the old-school UHF antenna that's hanging inside my attic (if not for the HOA, it would have been on my roof), but I don't know if that will do any good either...
    • Well sure, anything is possible. But it won't do you much good. A better idea might be to buy [cantenna.com] or build [nodomainname.co.uk] a cantenna.
    • I wouldn't try hooking anything to your phone wiring if you have land phone service. You don't want 80+ volts injected into your Wlan card. If you don't have phone service and want to hook up to that wire, get an isolation transformer and hook it up through that to match the resistance.

      As for your UHF antenna, it will probably be better than nothing, but not as good as the correct antenna since it is built for a different frequency.
  • Without messing around physically with the innards of my access point, is there a simple way to increase its range?
  • This book will be one of the many raffle prizes being given away at See our raffle page for [www.socall...o.orgscale] more info [socallinuxexpo.org]
  • The LinkSys WRT54G and client cards support this new thing called WPA -- WiFi Protected Access. According to the info at Linksys [linksys.com], WPA sorta builds on WEP, but improves it by doing regular key rotation (among other things).

    Folks who have worked out other improvements over WEP also stressed key rotation.

    So is WPA any good?

    It requires FW updates on the client cards, or a card that alread supports it (several of the LinkSys "54G" (802.11g) client cards do support it).

    The WRT54G router/AP and client

    • It's WEP with a time-based key rather than a static one. This makes it much harder to break becaus you can't get a large enough dataset to mount an attack. It also means that if they get one key, they can't decrypt more than a few packets before they need to find the next one. In other words, its significantly betterthan WEP.
  • here [waterville...etwork.org]

If all else fails, lower your standards.

Working...