Page 226 - StudyBook.pdf
P. 226

210    Chapter 4 • Communication Security: Wireless


             Figure 4.12 Configuring Shared-Key Authentication on WAP11 AP


































                 Armed with a valid WEP key, an intruder can successfully negotiate association
             with an AP and gain entry to the target network. Unless other mechanisms like
             MAC filtering are in place, this intruder can roam across the network and poten-
             tially break into servers or other systems.


                WEP Key Compromise
           Damage & Defense…  the same static WEP key in a production role for an extended period of
                Because casual attackers are now capable of WEP key retrieval, keeping

                time does not make sense. A static WEP key could be published into the
                underground by a hacker and still be used in a production WLAN six
                months later if there are no policies in place mandating regular change
                of keys. One of the easiest ways to mitigate the risk of WEP key compro-
                mise is to regularly change the WEP key on all APs and wireless clients.
                Although this is an easy task for administrators of small WLANs, it
                becomes extremely daunting on a large enterprise-size network. Both
                Cisco Systems and Funk Software have released access control servers that
                implement rapid WEP rekeying on both APs and the end-user clients.
                Even if a WEP key is discovered, utilizing this form of software within a
                specified period of time will render that particular key to be invalid.



          www.syngress.com
   221   222   223   224   225   226   227   228   229   230   231