
78
Chapter 3: IDS—Security Penetration
AirMagnet Laptop Wireless LAN Policy Reference Guide
Some of the major advantages of EAP-FAST are that it is not
proprietary, is compliant with the IEEE 802.11i standard, supports
TKIP and WPA, does not use certificates thus avoiding complex PKI
infrastructures and supports multiple Operating Systems on the PCs
and the Pocket PCs.
AirMagnet
Mobile
detects the presence of a potential ASLEAP attack
tool. Once detected, AirMagnet
Mobile
alerts the wireless
administrator and the user of the attacked station is advised to reset
his/her password. The best solution to counter potential ASLEAP
attacks is to replace LEAP with EAP-FAST in the corporate WLAN
environment.
Potential Honey Pot AP Detected
The addition of WLANs in the corporate environment introduces a
whole new class of threats for network security. RF signals that
penetrate walls and extend beyond intended boundaries can expose
the network to unauthorized users. The Rogue AP can put the entire
corporate network at risk of outside penetration and attack. Not to
understate the threat of the rogue AP, there are many other wireless
security risks and intrusions such as mis-configured AP,
unconfigured AP, and DoS attacks.
One of the most effective attacks facing enterprise networks
implementing wireless is the use of a “Honey pot” AP. An intruder
can using different tools such as NetStumbler, Wellenreiter,
MiniStumbler, etc. discover the SSID of the corporate AP. Then the
intruder can set up an AP outside the building premises or if possible
within the premises and will broadcast the corporate SSID previously
discovered. Any unsuspecting client could then connect to this
Honey pot AP with a higher signal strength. Once associated, the
intruder can perform various attacks against the client station as the
traffic will now be diverted through the Honey pot AP.
Once a Honeypot AP is identified and reported by AirMagnet
Mobile
, the WLAN administrator may use the FIND tool to locate
the rogue device.
Laptop Wireless LAN Policy Reference Guide.book Page 78 Thursday, January 25, 2007 5:36 PM
Summary of Contents for PRG-Laptop 7.0
Page 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Page 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...