19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

176<br />

Part III: Hacking Network Hosts<br />

Walk around your building or campus (warwalk, if you will) to perform this<br />

test to see what you can find. Physically look for devices that don’t belong<br />

and keep in mind that a well-placed AP or WLAN client that’s turned off won’t<br />

show up in your network analysis tools. Search near the outskirts of the building<br />

or near any publicly accessible areas. Scope out boardrooms and the<br />

offices of upper-level managers for any unauthorized devices. These places<br />

may be off-limits, but that’s all the more reason to check them for rogue APs.<br />

When searching for unauthorized wireless devices on your network, keep<br />

in mind that you might be picking up signals from nearby offices or homes.<br />

Therefore, if you find something, don’t immediately assume it’s a rogue<br />

device. One way to figure out whether a device is in a nearby office or home<br />

is by the strength of the signal you detect. Devices outside your office should<br />

have a weaker signal than those inside. Using a WLAN analyzer in this way<br />

helps narrow the location and prevent false alarms in case you detect legitimate<br />

neighboring wireless devices.<br />

It’s pays to know your network environment. Knowing what your surroundings<br />

should look like makes it easier to spot potential problems.<br />

A good way to determine whether an AP you discover is attached to your<br />

wired network is to perform reverse ARPs (RARPs) to map IP addresses to<br />

MAC addresses. You can do this at a command prompt by using the arp -a<br />

command and simply comparing IP addresses with the corresponding MAC<br />

address to see whether you have a match.<br />

Also, keep in mind that WLANs authenticate the wireless devices, not the<br />

users. Criminal hackers can use this to their advantage by gaining access<br />

to a wireless client via remote-access software, such as telnet or SSH, or by<br />

exploiting a known application or OS vulnerability. After they do that, they<br />

potentially have full access to your network and you could be none the wiser.<br />

Countermeasures against<br />

rogue wireless devices<br />

The only way to detect rogue APs and wireless hosts on your network is to<br />

monitor your WLAN proactively (say weekly, even daily), looking for indicators<br />

that wireless clients or rogue APs might exist. A WIPS is perfect for such<br />

monitoring. But if rogue APs or clients don’t show up, that doesn’t mean<br />

you’re off the hook. You might also need to break out the wireless network<br />

analyzer, wireless IPS, or other network management application.<br />

Depending on your AP, a couple of configuration changes might keep hackers<br />

from carrying out these hacks against you:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!