
122
Chapter 5: Authentication and Encryption
AirMagnet Laptop Wireless LAN Policy Reference Guide
Device Unproetected by EAP-FAST
It is well publicized that WLAN devices using static WEP key for
encryption are vulnerable to the WEP key cracking attack ( see the
paper
Weaknesses in the Key Scheduling Algorithm of RC4-I
by
Scott Fluhrer, Itsik Mantin and Adi Shamir
).
Cisco Systems introduced LEAP (Lightweight Extensible
Authentication Protocol) to leverage the existing 802.1x framework to
avoid such WEP key attacks. The Cisco LEAP solution provides
mutual authentication, dynamic per session and per user keys and
configurable WEP session key time out. The LEAP solution was
considered to be not only a stable security solution but also
considered to be easy to configure.
Joshua Wright, a network engineer at Johnson & Wales University in
Providence, Rhode Island has written a hacking tool that
compromises wireless LAN networks running LEAP by using off-
line dictionary attacks to break LEAP passwords The tool after
detecting WLAN networks that use LEAP, de-authenticates the users
forcing them to reconnect and provide their user name and password
credentials. The hacker can capture packets of legitimate users trying
to re-access the network. After that the attacker can analyze the traffic
off-line and guess the password by testing values from a dictionary.
The main features of the ASLEAP tool include:
• Reading live from any wireless interface in RFMON mode
with libpcap.
• Monitoring a single channel, or perform channel hopping to
look for target networks running LEAP.
• Actively deauthenticate users on LEAP networks, forcing
them to reauthenticate. This makes the capture of LEAP pass-
words very fast.
• Only de-authenticating users who have not already been
seen, doesn't waste time on users who are not running LEAP.
• Reading from stored libpcap files.
Laptop Wireless LAN Policy Reference Guide.book Page 122 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...