19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 9-3:<br />

NetStumbler<br />

displays<br />

detailed<br />

data on APs.<br />

✓ Vendor name<br />

✓ Whether encryption is on or off<br />

✓ RF signal strength (signal-to-noise ratio)<br />

Chapter 9: Wireless LANs<br />

Figure 9-3 shows an example of what you might see when running NetStumbler<br />

in your environment. The information that you see here is what others can<br />

see as long as they’re in range of your AP’s radio signals. NetStumbler and<br />

most other tools work by sending a probe-request signal from the client. Any<br />

APs within signal range must respond to the request with their SSIDs — that<br />

is, if they’re configured to broadcast their SSIDs upon request.<br />

When you’re using certain wireless security assessment tools, including<br />

NetStumbler and CommView for WiFi, your adapter might enter passive monitoring<br />

mode. This means you can no longer communicate with other wireless<br />

hosts or APs while the program is loaded.<br />

Discovering Wireless Network Attacks<br />

and Taking Countermeasures<br />

Various malicious hacks — including DoS attacks — can be carried out<br />

against your WLAN. This includes forcing APs to reveal their SSIDs during the<br />

process of being disassociated from the network and rejoining. In addition,<br />

hackers can literally jam the RF signal of an AP — especially in 802.11b and<br />

802.11g systems — and force the wireless clients to re-associate to a rogue<br />

AP masquerading as the victim AP.<br />

Hackers can create man-in-the-middle attacks by maliciously using such tools<br />

as ESSID-jack and monkey-jack and can flood your network with thousands<br />

of packets per second by using the raw packet-generation tools Nping or<br />

NetScanTools Pro — enough to bring the network to its knees. Even more so<br />

than with wired networks, this type of DoS attack is very difficult to prevent<br />

on WLANs.<br />

163

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!