Page 234 - StudyBook.pdf
P. 234
218 Chapter 4 • Communication Security: Wireless
listening to the network. In fact, a person who is listening does not even need to
be associated with the network in order to sniff.
Hackers have many tools available for attacking and monitoring wireless net-
works, such as AiroPeek (www.wildpackets.com/products/airopeek) for Windows,
Wireshark for Windows, and UNIX or Linux and TCPDump or ngrep
(http://ngrep.sourceforg.net) for a UNIX or Linux environment.These tools work
well for sniffing both wired and wireless networks.
All of these software packages function by putting the network card in promis-
cuous mode.When the NIC is in this mode, every packet that goes past the interface
is captured and displayed within the application window. If an attacker acquires a
WEP key, they can utilize features within AiroPeek and Wireshark to decrypt either
live or post-capture data.
By running NetStumbler, hackers are able to find possible targets. Figure 4.18
shows the output from NetStumbler with several networks that could be attacked.
Figure 4.18 Discovering Wireless LANs with NetStumbler
Once a hacker has found possible networks to attack, one of their first tasks is
to identify the target. Many organizations are “nice” enough to include their names
or addresses in the network name.
www.syngress.com