Page 129 - StudyBook.pdf
P. 129

Communication Security: Remote Access and Messaging • Chapter 3  113

                 Typically, a 128-bit key can be returned in as little as a few seconds to a few
                 minutes.

                 WEPCrack

                 While AirSnort is known for capturing packets and recreating secret keys,
                 WEPCrack simply breaks the secret keys.WEPCrack was one of the first software
                 packages able to break the security of WEP technology.WEPCrack is available for
                 download at: http://sourceforge.net/projects/wepcrack.


                   Protecting Against AirSnort and WEPCrack
               Damage & Defense…  are easily detected. Most Intrusion Detection Systems (IDSes) and
                   Although both of these tools pose serious risk to a wireless network, they

                   Intrusion Prevention Systems (IPSes) are able to detect attacks on wireless
                   networks. The key is to make sure the IxS is up-to-date and functional.
                   Implementing technologies such as VPNs, Internet Protocol Security
                   (IPSec), and SSL, greatly increase the reliability of the wireless network.










                 NOTE
                      Wireless technologies are covered in greater detail in Chapter 4.






                 Media Access Control Authentication
                 Media Access Control (MAC) authentication is a weak form of authentication.
                 MAC addresses are 48-bit unique identifiers that are assigned to every network
                 interface by the manufacturer. During MAC authentication, a wireless client’s MAC
                 address is checked against an authentication server on the network, and the server
                 checks the address against a list of allowed MAC addresses. Spoofing of MAC
                 addresses is trivial and so MAC-based authentication is dramatically less secure than
                 EAP authentication. However, MAC-based authentication provides an alternate
                 authentication method for client devices that do not have EAP capability. In most






                                                                              www.syngress.com
   124   125   126   127   128   129   130   131   132   133   134