CEH.V6.-.Module.20.Hacking.Wireless.Networks

The data that is received will then be encrypted and

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: N It detects all rogue WLANs It secures a wireless LAN by recognizing and responding to intruders and attacks as they happen It performs real-time network audits to inventory all hardware, tracks all wireless LAN activity, and enforces WLAN policies for security and management It monitors the health of the network to identify and respond to hardware failures, network interferences, and performance degradation Source: www.AirDefense.com EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited AirDefense Guard: Screenshot EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Google Secure Access Google Google Secure Access is a downloadable client application that allows users to establish a more secure WiFi connection It connects to Google's VPN ("Virtual Private Private Network") It It encrypts your Internet traffic and sends it through Google's servers to the Internet. The data that is received will then be encrypted and sent back through Google’s servers to your computer EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Tool: RogueScanner RogueScanner is a network security tool for automatically discovering rogue wireless access points by scanning a wired network It can also be used for network asset discovery It can find all network connected devices like printers, routers, web cameras, and PCs PC EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited What Happened Next? Jason Springfield, an ethical hacker, was called in to investigate the incident. Jason performed the Jason following tests: • He scanned the network and traced it • He checked for SSID broadcasted and secured it by assigning unique alpha numeric values • He traced rogue access points by using tools, such as, NetStumbler and MiniStumbler He • He deployed WEP to provide confidentiality of data on WLAN • He employed WSA for auditing the network and traced the vulnerabilities Jason suggested them to take following precautions: • Use MAC address filtering, SSID, and firewalls for wireless networks networks • Use infrared beams to transport data EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Summary A wireless network enables a mobile user to connect to a LAN through a wireless (radio) connection Wired Equivalent Privacy (WEP) is designed to provide a WLAN with a level of security and privacy comparable to what is usually expected of a wired LAN It is vulnerable because of relatively short IVs and keys that remain static Even if WEP is enabled, an attacker can easily sniff MAC addresses as they appear in the clear format. Spoofing MAC addresses is also easy Wireless networks are vulnerable to DoS attacks Wireless network security can adopt a suitable strategy of MAC address filtering, firewalling, or a combination of protocol-based measures EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited...
View Full Document

This note was uploaded on 02/12/2013 for the course CEH v6 taught by Professor John during the Summer '13 term at West Point.

Ask a homework question - tutors are online