Page 259 - StudyBook.pdf
P. 259

Communication Security: Wireless • Chapter 4  243

                       Any authentication information that is broadcast can often be replayed to
                         services requiring authentication (NT Domain,WEP authentication, and
                         so on) to access resources.

                       The use of VPNs, SSL, and SSH helps protect against wireless interception.
                       Due to the design of TCP/IP, there is little that you can do to prevent
                         MAC/IP address spoofing. Static definition of MAC address tables can
                         prevent this type of attack. However, due to significant overhead in
                         management, this is rarely implemented.

                       Wireless network authentication can be easily spoofed by simply replaying
                         another node’s authentication back to the AP when attempting to connect
                         to the network.

                       Many wireless equipment providers allow for end users to redefine the
                         MAC address for their cards through the configuration utilities that come
                         with the equipment.
                       External two-factor authentication such as RADIUS or SecurID should
                         be implemented to additionally restrict access requiring strong
                         authentication to access the wireless resources.
                       Due to the design of TCP/IP, some spoof attacks allow for attackers to
                         hijack or take over network connections established for other resources on
                         the wireless network.
                       If an attacker hijacks the AP, all traffic from the wireless network gets
                         routed through the attacker, so the attacker can then identify passwords
                         and other information that other users are attempting to use on valid
                         network hosts.
                       Many users are susceptible to these MITM attacks, often entering their
                         authentication information even after receiving many notifications that
                         SSL or other keys are not what they should be.
                       Rogue APs can assist the attacker by allowing remote access from wired or
                         wireless networks.These attacks are often overlooked as just faults in the
                         user’s machine, allowing attackers to continue hijacking connections with
                         little fear of being noticed.

                       Many wireless networks that use the same frequency within a small space
                         can easily cause network disruptions and even DoS for valid network
                         users.



                                                                              www.syngress.com
   254   255   256   257   258   259   260   261   262   263   264