Page 393 - StudyBook.pdf
P. 393

Infrastructure Security: Devices and Media • Chapter 6  377

                 covered in this section.Wireless technology provides a convenient method of
                 accessing a network by eliminating the cables that are generally associated with net-
                 work connectivity.While this can be a great convenience to laptop users, it intro-
                 duces a whole new world of security vulnerabilities to a network.
                    The primary devices associated with wireless networking are wireless access points
                 and the wireless network cards used to communicate with the access points.There are
                 other devices such as signal boosters, but they are not a component of this exami-
                 nation.Wireless network cards are designed to communicate with either other
                 wireless network cards or to a wireless access point. Card-to-card communication is
                 considered an “ad-hoc network” and are commonly used to quickly link two sys-
                 tems together without the use of either a hardware or software access point.
                    A new attack technique that has risen in the popularity of wireless networks is
                 war driving.This involves a hacker driving around with a laptop equipped with a
                 wireless network card looking for wireless cells to connect to. Usually they will
                 have a high-powered antenna to increase the effective range of their scans. In
                 recent news, war drivers have been able to easily connect to corporate and govern-
                 ment networks using this technique.The vulnerabilities that were exploited on
                 these networks could have been negated if the implementation of the wireless net-
                 work had included adequate security measures. In some cases, war driving has
                 evolved to the point that war drivers mark vulnerable locations by marking the
                 sidewalk with chalk (war chalking) or other means just to make it easier on the next
                 war driver.
                    Wireless access points have a limited range (which differs by model and antenna
                 type) within which they can effectively communicate with client systems. Keeping
                 this range in mind when planning a wireless implementation significantly improves
                 the corresponding security implementation. Planning the placement of the wireless
                 access points so that the outer range of their transmission distance corresponds with
                 the walls of the building, prevents external access to a wireless network.
                    In addition, both incoming and outgoing wireless transmissions can also be
                 stopped by the walls of a building.When planning a wireless implementation
                 within a new construction, it is important to work with the designers to make sure
                 that the external walls contain metal studs that are grounded. Using thin layers of
                 aluminum under the drywall creates what is effectively a wireless shield, which will
                 block most radio transmissions into and out of the building.This will also interfere
                 with pager and cellular phone usage.
                    Proper placement of wireless access points and appropriate shielding within the
                 building where possible, will substantially decrease the vulnerability of a wireless




                                                                              www.syngress.com
   388   389   390   391   392   393   394   395   396   397   398