19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figure 9-19:<br />

Ensure that<br />

your SSID<br />

is correctly<br />

set.<br />

Chapter 9: Wireless LANs<br />

Even if your network is running WEP or WPA, you can still test your MAC<br />

address controls. You just need to enter your encryption key(s) before<br />

you can connect.<br />

5. Obtain an IP address on the network.<br />

You can do this by rebooting or disabling/enabling your wireless NIC.<br />

However, you can do it manually by running ipconfig /renew at a<br />

Windows command prompt or by manually entering a known IP address<br />

in your wireless network card’s network properties.<br />

6. Confirm that you’re on the network by pinging another host or browsing<br />

the Internet.<br />

In this example, I could ping the AP (10.11.12.154) or simply load my<br />

favorite web browser to see whether I can access the Internet.<br />

That’s all there is to it! You’ve circumvented your wireless network’s MAC<br />

address controls in six simple steps. Piece of cake!<br />

Countermeasures against MAC spoofing<br />

The easiest way to prevent the circumvention of MAC address controls and<br />

subsequent unauthorized attachment to your wireless network is to enable<br />

WPA or ideally WPA2. Another way to control MAC spoofing is by using a<br />

wireless IPS. This second option is certainly more costly, but it could be well<br />

worth the money when you consider the other proactive monitoring and<br />

blocking benefits such a system would provide.<br />

181

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!