Page 260 - StudyBook.pdf
P. 260

244    Chapter 4 • Communication Security: Wireless

                   If an attacker hijacks the AP and does not pass traffic on to the proper
                      destination, all users of the network will be unable to use the network.

                   Flooding the wireless network with transmissions can prevent other
                      devices from utilizing the resources, making the wireless network
                      inaccessible to valid network users.

                   Wireless attackers can utilize strong and directional antennas to attack the
                      wireless network from a great distance.
                   An attacker who has access to the wired network can flood the wireless
                      AP with more traffic than it can handle, preventing wireless users from
                      accessing the wired network.
                   When installing and configuring a new AP, you should change the default
                      settings such as the SSID.
                   Wireless networks should be placed in a separate network segment.

                   Site surveys should be conducted regularly to detect and remove of rogue
                      APs.

                   Updates, service packs, patches and hot fixes should be applied to all
                      operating systems and software.
                   Many new wireless products utilize the same wireless frequencies as
                      802.11 networks.A simple cordless telephone can create a DoS situation
                      for the network.

             Site Surveys


                   Tools used in site surveys include wireless Sniffers, directional or parabolic
                      dish antennae, and GPS receivers.
                   Wireless sniffers that can be used in a site survey include the Windows-
                      based NetStumbler and the UNIX/Linux-based Kismet or Wireshark.

                   Site surveys are used to map out the extent to which wireless networks are
                      visible outside the physical boundaries of the buildings in which their
                      components are installed.











          www.syngress.com
   255   256   257   258   259   260   261   262   263   264   265