Page 260 - StudyBook.pdf
P. 260
244 Chapter 4 • Communication Security: Wireless
If an attacker hijacks the AP and does not pass traffic on to the proper
destination, all users of the network will be unable to use the network.
Flooding the wireless network with transmissions can prevent other
devices from utilizing the resources, making the wireless network
inaccessible to valid network users.
Wireless attackers can utilize strong and directional antennas to attack the
wireless network from a great distance.
An attacker who has access to the wired network can flood the wireless
AP with more traffic than it can handle, preventing wireless users from
accessing the wired network.
When installing and configuring a new AP, you should change the default
settings such as the SSID.
Wireless networks should be placed in a separate network segment.
Site surveys should be conducted regularly to detect and remove of rogue
APs.
Updates, service packs, patches and hot fixes should be applied to all
operating systems and software.
Many new wireless products utilize the same wireless frequencies as
802.11 networks.A simple cordless telephone can create a DoS situation
for the network.
Site Surveys
Tools used in site surveys include wireless Sniffers, directional or parabolic
dish antennae, and GPS receivers.
Wireless sniffers that can be used in a site survey include the Windows-
based NetStumbler and the UNIX/Linux-based Kismet or Wireshark.
Site surveys are used to map out the extent to which wireless networks are
visible outside the physical boundaries of the buildings in which their
components are installed.
www.syngress.com