It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
Here is a list of tools discussed in this chapter and others you might find useful:
-
http://www.netstumbler.com
-
http://www.kismetwireless.net
-
Introduction to kismet: http://www.wi-fiplanet.com/tutorials/article.php/3595531
-
BackTrack: http://www.remote-exploit.org/index.php/BackTrack
-
Operator: http://www.ussysadmin.com/operator
-
PHLAK: http://www.public.planetmirror.com/pub/phlak/?fl=p
-
Knoppix-STD: http://www.knoppix-std.org/download.html
-
Wardriving hardware: http://www.wardrivingworld.com
-
Software tools: http://www.wardrive.net/security/tools
-
http://www.paraben-forensics.com