Summary
The only way to find out how secure your WLAN is and what attackers can do once they are in is by looking at your WLAN and connected wired LAN security via the cracker's eyes and trying the attacks yourself. The only way to run an external audit of wireless network security properly and efficiently is to emulate a determined and resourceful Black Hat. Wandering around the WLAN zone of coverage with a copy of Netstumbler or even Sniffer Wireless won't help a lot; at best it can be considered a wireless zone survey, but by no means a security audit.
Gain your experience in WLAN and even general LAN and gateway security by experimenting with the tools we have mentioned or even trying to modify or rewrite them (thanks to GNU and Berkeley licenses, it is possible). If the results of your experiments won't make you paranoid, we don't know what will.
This brings to a logical end the first half of the book, devoted to penetration testing and attack techniques on 802.11 networks. In the next part we attempt to show you what needs to be done to stop a determined attacker from taking over your network, ruining your business, or making you unemployed.
|