
14
Chapter 1: Configuration Vulnerabilities
AirMagnet Laptop Wireless LAN Policy Reference Guide
Airsnarf
is a wireless access point setup utility to show how a hacker
can steal username and password credentials from public wireless
hotspots. Airsnarf, a shell script based tool creates a hotspot complete
with a captive portal where the users enter their login information.
Important values such as local network information, gateway IP
address, and SSID to assume can be configured within the airsnarf
configuration file. This tool initially broadcasts a very strong signal,
that will disassociate the hotspot wireless clients from the authorized
AP connected to the Internet. The wireless clients assuming that they
were temporarily disconnected from the Internet due to some
unknown issue, will try to login again to resume their activities.
Innocent wireless clients that associate to the Airsnarf access point
receive the IP address, DNS address, and gateway IP address from
the rogue Airsnarf Access Point instead of the legitimate AP installed
by the hotspot operator. The users will be shown a webpage that
requests a username and password as now the DNS queries are
resolved by the rogue Airsnarf AP. The username and password
entered will be mailed to root@localhost. The user name and
password can be used in any other hotspot location of the same
provider anywhere in the nation without the user realizing the
misuse. The only case where it could have lesser impact is if the
hotspot user is connected using a pay-per-minute usage scheme. The
AirSnarf tool can be downloaded by hackers from
http://
airsnarf.shmoo.com/
Laptop Wireless LAN Policy Reference Guide.book Page 14 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...