
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 5: Authentication and Encryption
123
• Using a dynamic database table and index to make lookups
on large files very fast. This reduces the worst-case search time to
.0015% as opposed to lookups in a flat file.
• Writing just the LEAP exchange information to a libpcap file.
This could be used to capture LEAP credentials with a device short
on disk space (like an iPaq), and then process the LEAP credentials
stored in the libpcap file on a system with more storage resources to
mount the dictionary attack.
The source and Win32 binary distribution for the tool are available at
http://asleap.sourceforge.net
.
Cisco Systems has developed the Extensible Authentication Protocol-
Flexible Authentication via Secure Tunneling (EAP-FAST) protocol
which will stop these dictionary attacks. EAP-FAST helps prevent
Man-in-the-middle attacks, dictionary attacks, packet and
authentication forgery attacks. In EAP-FAST, a tunnel is created
between the client and the server using a PAC (Protected Access
Credential) to authenticate each other. After the tunnel establishment
process, the client is then authenticated using the user-name and
password credentials.
Some of the major advantages of EAP-FAST are that it is not
proprietary, is compliant with the IEEE 802.11i standard, supports
TKIP and WPA, does not use certificates thus avoiding complex PKI
infrastructures and supports multiple Operating Systems on the PCs
and the Pocket PCs.
AirMagnet
Mobile
alerts the wireless administrator on devices that
are using the 802.1x authentication mechanism but are not using the
EAP-FAST protocol. It is recommended that EAP-FAST be
implemented in the wireless environment.
Device Unprotected by PEAP
AirMagnet Mobile monitors on 802.1x transactions and their specific
EAP (Extensible Authentication Protocol) types. Among all EAP
types (such as PEAP, TLS, TTLS, LEAP, OTP, etc.), PEAP (Protected
EAP) is especially noteworthy. By adopting PEAP as your
authentication method, your 802.1x security authentication protocol
will be better protected by TLS (Transport Layer Security). EAP
methods running within PEAP are provided with built-in advantages
regarding:
Laptop Wireless LAN Policy Reference Guide.book Page 123 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...