19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

182<br />

Part III: Hacking Network Hosts<br />

Physical security problems<br />

Various physical security vulnerabilities can result in physical theft, the<br />

reconfiguration of wireless devices, and the capturing of confidential information.<br />

You should look for the following security vulnerabilities when testing<br />

your systems:<br />

✓ APs mounted on the outside of a building and accessible to the public.<br />

✓ Poorly mounted antennas — or the wrong types of antennas — that<br />

broadcast too strong a signal and that are accessible to the public. You<br />

can view the signal strength in NetStumbler, your wireless client manager,<br />

or one of the commercial tools I mention earlier in this chapter.<br />

These issues are often overlooked because of rushed installations, improper<br />

planning, and lack of technical knowledge, but they can come back to haunt<br />

you. The book Wireless Networks For Dummies provides more details.<br />

Countermeasures against physical<br />

security problems<br />

Ensure that APs, antennas, and other wireless and network infrastructure<br />

equipment are locked away in secure closets, ceilings, or other places that<br />

are difficult for a would-be intruder to access physically. Terminate your APs<br />

outside any firewall or other network perimeter security devices — or at<br />

least in a DMZ — whenever possible. If you place unsecured wireless equipment<br />

inside your secure network, it can negate any benefits you would get<br />

from your perimeter security devices, such as your firewall.<br />

If wireless signals are propagating outside your building where they don’t<br />

belong, either<br />

✓ Turn down the transmit power setting of your AP.<br />

✓ Use a smaller or different antenna (semidirectional or directional) to<br />

decrease the signal.<br />

Some basic planning helps prevent these vulnerabilities.<br />

Vulnerable wireless workstations<br />

Wireless workstations have tons of security vulnerabilities — from weak<br />

passwords to unpatched security holes to the storage of WEP and WPA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!