19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 9: Wireless LANs<br />

encryption keys locally. Most of the well-known wireless client vulnerabilities<br />

have been patched by their respective vendors, but you never know whether<br />

all your wireless systems are running the latest (and usually safest) versions<br />

of operating systems, wireless client software, and other software applications.<br />

In addition to using the wireless client, stumbling, and network analysis software<br />

I mention earlier in this chapter, you should also search for wireless<br />

client vulnerabilities by using various vulnerability testing tools, such as GFI<br />

LanGuard, QualysGuard, and Acunetix Web Vulnerability Scanner.<br />

These programs aren’t wireless-specific, but they might turn up vulnerabilities<br />

in your wireless computers that you might not have discovered or<br />

thought about testing otherwise. I cover operating system and application<br />

vulnerabilities as well as using the tools in the preceding list in Parts IV and V<br />

of this book.<br />

Countermeasures against vulnerable<br />

wireless workstations<br />

You can implement the following countermeasures to keep your workstations<br />

from being used as entry points into your WLAN:<br />

✓ Regularly perform vulnerability assessments on your wireless workstations,<br />

in addition to other network hosts.<br />

✓ Apply the latest vendor security patches and enforce strong user passwords.<br />

✓ Use personal firewalls and endpoint security software on all wireless<br />

systems where possible, including smartphones and tablets, to keep<br />

malicious intruders off those systems and out of your network.<br />

✓ Install anti-malware software.<br />

Default configuration settings<br />

Similar to wireless workstations, wireless APs have many known vulnerabilities.<br />

The most common ones are default SSIDs and admin passwords. The more<br />

specific ones occur only on certain hardware and software versions that are<br />

posted in vulnerability databases and vendor websites. Many wireless systems<br />

still have WEP and WPA disabled by default as well.<br />

183

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!