
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 1: Configuration Vulnerabilities
11
authentication/encryption settings, SNMP read/write community
strings, etc. Such default values are public knowledge available in
user manuals and installation guides on the vendor web site and may
be used by wireless hackers to compromise WLAN security.
Figure 1-9: Sample default SSIDs for APs from different wireless
equipment vendors
AirMagnet
Mobile
scans the WLAN for unconfigured APs by
matching factory default settings against an internal database of well
known default configurations such as SSID. When a match is found,
AirMagnet
Mobile
alerts the WLAN administrator of the
unconfigured AP. The administrator should change the default
settings of the AP to avoid easy hacking of the AP.
Device Vulnerable to Hotspot Attack Tools
A hotspot is any location where Wi-Fi network access is made
available for the general public. One often finds hotspots in airports,
hotels, coffee shops, and other places where business people tend to
congregate. It is probably one of the most important network access
services for business travelers these days. All the customer requires is
a wireless-enabled laptop or handheld. Then the user can connect to
the legitimate access point and get the service. Most Hotspots do not
require the user to have any advanced authentication mechanisms to
connect to the access point, instead simply popping up a web page
for the user to login. So, the criterion for entry is dependent only on
whether the subscriber has paid the subscription fees or not. In a
Default SSID
Vendor / Products
tsunami
Cisco Aironet
Compaq
Compaq WL-100/200/300/400
WLAN
D-Link DL-713
WLAN
SMC SMC2652W/SMC2526W
comcomcom
3Com AirConnect
Intel
Intel Pro/Wireless 2011
Symbol
Symbol Technologies AP
AirPort Network
Apple Airport
Mello
ZCOMMax XWL 450
Roamabout Default
Network Name
Lucent, Cabletron, or Enterasys AP
Bridge
SMC SMC2682
MAC address
SOHOware NetBlaster
Laptop Wireless LAN Policy Reference Guide.book Page 11 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...