Roamer

From Security Weekly Wiki
Jump to navigationJump to search

Interview With Chris "Roamer" Hurley

http://www.computerworld.com/mobiletopics/mobile/story/0,10801,94225,00.html

http://www.worldwidewardrive.org/

Wardriving & Wireless Penetration Testing

WarDriving: Drive, Detect, Defend: A Guide to Wireless Security

http://www.amazon.com/Infosec-Career-Hacking-Your-Skillz/dp/1597490113/sr=8-2/qid=1157825997/ref=sr_1_2/102-7060425-9053715?ie=UTF8&s=books

Chris's "Other" Web Site

Questions

How did you get started with computers and eventually computer security?

What peeked your interest in war driving and wirless security?

Tell us about the World Wide Wireless War Drive, how did it get started and what was its purpose?

How does it differ from the Def Con war drive? What is its purpose?

Do you think people have learned and gotten better at locking down their wireless networks?

Tell about Chris Hurley's war driving rig.

There are many different opinions on the legality of "Wireless piggybacking" where you use someone elses open wireless network. We even did an entire show on it. What are your thoughts? Is it legal? Moral? Okay in certain circumstances?

People are always asking us what kind of hardware to buy for wireless pen testing and hacking. Any recommendations?

What do you think about the current wireless driver vulnerability situation?

We are seeing more and more municipal WiFi, do you think this is a good idea? Some implementations are going to use WiMax down to the client level, does this present yet another wireless hacking platform?

If could, give us an overview of a wireless pen test. How does it differ from a regular pen test? Do you do this remotely or on site?

Tell us about your latest book, "Wardriving and Wireless Penetration Testing".

Tell us, and our listeners too, how to Cheat at securing a wireless network. I'm all for winning, but ya know, win if you can, lose if you must, but always cheat :)

Which chaper in the "Stealing The Network: How to 0wn and Identity" did you write? What was that experience like?

What is your recommendation for securing home wireless network and a companies wireless network?

I see you also did some work on "OS X For the Hackers Heart", r u a Mac user?

[Record sweeper!]