19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

158<br />

Part III: Hacking Network Hosts<br />

✓ Loss of network access, including e-mail, web, and other services that<br />

can cause business downtime<br />

✓ Loss of sensitive information, including passwords, customer data,<br />

intellectual property, and more<br />

✓ Regulatory consequences and legal liabilities associated with unauthorized<br />

users gaining access to your business systems<br />

Most of the wireless vulnerabilities are in the 802.11 standard and how it works.<br />

Wireless access points (APs) and client systems have some vulnerabilities<br />

as well.<br />

Various fixes have come along in recent years to address these vulnerabilities,<br />

yet still many of these fixes haven’t been properly applied or aren’t<br />

enabled by default. Your employees might also install rogue WLAN equipment<br />

on your network without your knowledge. Then there’s “free” Wi-Fi<br />

practically everywhere your mobile workforce goes. These free Internet connections<br />

are one of the most serious threats to your overall information security<br />

and a pretty difficult one to fight. Even when WLANs are hardened and all<br />

the latest patches have been applied, you still might have security problems,<br />

such as DoS, man-in-the-middle attacks, and encryption key weaknesses (like<br />

you have on wired networks — see Chapter 8), that will likely be around for a<br />

while.<br />

Choosing Your Tools<br />

Several great WLAN security tools are available for both the Windows and<br />

UNIX platforms. The UNIX tools — which run mostly on Linux and BSD —<br />

were notoriously a bear to configure and run properly, but that problem<br />

has changed in recent years in programs such as Kismet (www.kismet<br />

wireless.net) and Wellenreiter (http://sourceforge.net/projects/<br />

wellenreiter).<br />

If you want the power of the security tools that run on Linux, but you’re<br />

not interested in installing and learning much about Linux or don’t have<br />

the time to download and set up many of its popular security tools, I highly<br />

recommend you check out BackTrack (www.backtrack-linux.org). The<br />

bootable Debian-based Linux CD “automagically” detects your hardware settings<br />

and comes with a slew of security tools that are relatively easy to use.<br />

Alternative bootable (or live) CDs include the Fedora Linux-based Network<br />

Security Toolkit (www.networksecuritytoolkit.org). A complete listing<br />

of live bootable Linux toolkits is available at www.livecdlist.com.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!