19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 9: Wireless LANs<br />

✓ If possible, increase your wireless beacon broadcast interval to the maximum<br />

setting, which is around 65,535 milliseconds (roughly 66 seconds).<br />

This can help hide the AP from hackers who are wardriving or walking<br />

by your building quickly. Be sure to test this first, though, because it<br />

might create other unintended consequences, such as legitimate wireless<br />

clients not being able to connect to your network. For more specific<br />

details on wireless protocols, check out Wireless Networks For Dummies<br />

by Peter T. Davis and Barry Lewis.<br />

✓ Disable probe responses to prevent your AP from responding to such<br />

requests.<br />

Use personal firewall software, such as Windows Firewall, on all wireless hosts<br />

to prevent unauthorized remote access into your hosts, and subsequently,<br />

your network.<br />

Finally, don’t forget about user education. It’s not foolproof, but it can help<br />

serve as an additional layer or defense. Ensure that security is always on the<br />

top of everyone’s mind. Chapter 18 contains additional information about<br />

user awareness and training.<br />

MAC spoofing<br />

A very common defense for wireless networks is Media Access Control (MAC)<br />

address controls. This is where you configure your APs to allow only wireless<br />

clients with known MAC addresses to connect to the network. Consequently,<br />

a very common hack against wireless networks is MAC address spoofing.<br />

The bad guys can easily spoof MAC addresses in UNIX, by using the ifconfig<br />

command, and in Windows, by using the SMAC utility, as I describe in<br />

Chapter 8. However, like WEP and WPA, MAC-address-based access controls<br />

are another layer of protection and better than nothing at all. If someone spoofs<br />

one of your MAC addresses, the only way to detect malicious behavior is<br />

through contextual awareness by spotting the same MAC address being used<br />

in two or more places on the WLAN, which can be tricky.<br />

One simple way to determine whether an AP is using MAC address controls is<br />

to try to associate with it and obtain an IP address via DHCP. If you can get an<br />

IP address, the AP doesn’t have MAC address controls enabled.<br />

The following steps outline how you can test your MAC address controls and<br />

demonstrate just how easy they are to circumvent:<br />

1. Find an AP to attach to.<br />

You can do this simply by loading NetStumbler, as shown in Figure 9-16.<br />

177

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!