Low tech wireless hacking

It does no good to hermetically seal the windows in an organization if the doors are left wide open. But that is precisely what many organizations are doing today when they neglect to secure their wireless communications systems. Organizations habitually overlook the security of their wireless communications because they cannot see it. If they cannot see it, then they presume that no one else can either, and it is safe. However, that presumption cannot be farther from the truth. This chapter is dedicated to thwarting wireless systems of all types, armed with everything from a bobby pin to a yagi antenna. The goal of this chapter is to enable readers to “see” wireless, by explaining how it works, describing different types of devices that share common mediums and functionality, and offering clear explanations of security vulnerabilities using real-world examples. The attacks included are part of the low tech hacking subgenre of wireless assaults.