Hacking For Dummies, 4th Edition by Kevin Beaver CISSP
Author:Kevin Beaver, CISSP
Language: eng
Format: epub
Publisher: John Wiley and Sons, Inc.
Published: 2013-07-31T16:00:00+00:00
Chapter 9
Wireless LANs
In This Chapter
Understanding risks of wireless LANs
Selecting wireless LAN hacking tools
Cracking wireless encryption
Minimizing wireless LAN risks
Wireless local area networks (WLANs, also called Wi-Fi) — specifically, the ones based on the IEEE 802.11 standard — are increasingly being deployed into both business and home networks. WLANs have been the poster child for weak security and network hack attacks since the inception of 802.11 over a decade ago. The stigma of unsecure WLANs is starting to wane, but this isn’t the time to lower your defenses.
WLANs offer a ton of business value, from convenience to reduced network deployment time. Whether or not your organization allows wireless network access, you probably have it, so testing for WLAN security vulnerabilities is critical. In this chapter, I cover some common wireless network security vulnerabilities that you should test for, and I discuss some cheap and easy countermeasures that you can implement to help ensure that WLANs aren’t more of a risk to your organization than they’re worth.
Understanding the Implications of Wireless Network Vulnerabilities
WLANs are very susceptible to attack — even more so than wired networks (discussed in Chapter 8). Wireless networks have vulnerabilities that can allow an attacker to bring your network to its knees or allow your sensitive information to be extracted right out of thin air. If your WLAN is compromised, you can experience the following problems:
Loss of network access, including e-mail, web, and other services that can cause business downtime
Loss of sensitive information, including passwords, customer data, intellectual property, and more
Regulatory consequences and legal liabilities associated with unauthorized users gaining access to your business systems
Most of the wireless vulnerabilities are in the 802.11 standard and how it works. Wireless access points (APs) and client systems have some vulnerabilities as well.
Various fixes have come along in recent years to address these vulnerabilities, yet still many of these fixes haven’t been properly applied or aren’t enabled by default. Your employees might also install rogue WLAN equipment on your network without your knowledge. Then there’s “free” Wi-Fi practically everywhere your mobile workforce goes. These free Internet connections are one of the most serious threats to your overall information security and a pretty difficult one to fight. Even when WLANs are hardened and all the latest patches have been applied, you still might have security problems, such as DoS, man-in-the-middle attacks, and encryption key weaknesses (like you have on wired networks — see Chapter 8), that will likely be around for a while.
Choosing Your Tools
Several great WLAN security tools are available for both the Windows and UNIX platforms. The UNIX tools — which run mostly on Linux and BSD — were notoriously a bear to configure and run properly, but that problem has changed in recent years in programs such as Kismet (www.kismetwireless.net) and Wellenreiter (http://sourceforge.net/projects/wellenreiter).
If you want the power of the security tools that run on Linux, but you’re not interested in installing and learning much about Linux or don’t have the time to
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(12595)
Hello! Python by Anthony Briggs(9928)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9804)
The Mikado Method by Ola Ellnestam Daniel Brolund(9790)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(9411)
Dependency Injection in .NET by Mark Seemann(9348)
Hit Refresh by Satya Nadella(8834)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8310)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7773)
The Kubernetes Operator Framework Book by Michael Dame(7741)
Grails in Action by Glen Smith Peter Ledbrook(7705)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7569)
Exploring Deepfakes by Bryan Lyon and Matt Tora(7537)
Practical Computer Architecture with Python and ARM by Alan Clements(7458)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7438)
Robo-Advisor with Python by Aki Ranin(7415)
Building Low Latency Applications with C++ by Sourav Ghosh(7311)
Svelte with Test-Driven Development by Daniel Irvine(7285)
