Page 234 - StudyBook.pdf
P. 234

218    Chapter 4 • Communication Security: Wireless

             listening to the network. In fact, a person who is listening does not even need to
             be associated with the network in order to sniff.
                 Hackers have many tools available for attacking and monitoring wireless net-
             works, such as AiroPeek (www.wildpackets.com/products/airopeek) for Windows,
             Wireshark for Windows, and UNIX or Linux and TCPDump or ngrep
             (http://ngrep.sourceforg.net) for a UNIX or Linux environment.These tools work
             well for sniffing both wired and wireless networks.
                 All of these software packages function by putting the network card in promis-
             cuous mode.When the NIC is in this mode, every packet that goes past the interface
             is captured and displayed within the application window. If an attacker acquires a
             WEP key, they can utilize features within AiroPeek and Wireshark to decrypt either
             live or post-capture data.
                 By running NetStumbler, hackers are able to find possible targets. Figure 4.18
             shows the output from NetStumbler with several networks that could be attacked.

             Figure 4.18 Discovering Wireless LANs with NetStumbler

































                 Once a hacker has found possible networks to attack, one of their first tasks is
             to identify the target. Many organizations are “nice” enough to include their names
             or addresses in the network name.




          www.syngress.com
   229   230   231   232   233   234   235   236   237   238   239