
18
Chapter 1: Configuration Vulnerabilities
AirMagnet Laptop Wireless LAN Policy Reference Guide
client is searching for service. After learning the user profiles, an
attacker can bring up an AP advertising for the desired service (SSID)
to lure the client for association. Once the unsuspecting user station
has associated, the attacker gains network access to the client station.
Figure 1-13: Laptop with an open WLAN connection risks exposing data
on the laptop and the corporate wired network
AirMagnet Mobile detects client stations that constantly search for
association, thus leaving thesmelves vulnerable. Typically, they are
client stations mis-configured manually or automatically by the
vendor profile selector. This scenario is even more dangerous for an
enterprise where the use of wireless is prohibited. The common way
this threat takes form is:
1)
A laptop with built-in WiFi is used at home with minimal or no
wireless security.
2)
The same laptop is used at work where no WLAN is allowed.
3)
The laptop is connected to the enterprise wired LAN for
connectivity.
4)
The laptop's built-in WiFi card continues to search for service all
day.
5)
An attacker puts up an AP to associate with the laptop.
6)
Once associated, the attacker gains access to the laptop.
Laptop Wireless LAN Policy Reference Guide.book Page 18 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...