
AirMagnet Laptop Wireless LAN Policy Reference Guide
Table of Contents
i
Table of Contents
Part One: Security IDS/IPS .................................................... 1
Chapter 1: Configuration Vulnerabilities ...................................3
Ad-hoc Station Detected....................................................................................... 3
AP Broadcasting SSID ......................................................................................... 4
AP Configuration Changed................................................................................... 5
AP Operating in Bridged Mode Detected............................................................. 8
AP Using Default Configuration ........................................................................ 10
Device Vulnerable to Hotspot Attack Tools....................................................... 11
Potential Pre-802.11n device detected................................................................ 15
Exposed Wireless Station Detected .................................................................... 17
LEAP Vulnerability Detected............................................................................. 19
Chapter 2: IDS—Denial of Service Attack................................23
DoS Attack Against AP ...................................................................................... 23
DoS Attack: Association Flood............................................................ 24
DoS Attack: Association Table Overflow............................................ 26
DoS Attack: Authentication Flood ....................................................... 26
DoS Attack: EAPOL-Start Attack........................................................ 28
DoS Attack: PS Poll Flood Attack ....................................................... 29
DoS Attack: Unauthenticated Association ........................................... 30
DoS Attack Against Infrastructure ..................................................................... 32
DoS Attack: CTS Flood ....................................................................... 32
DoS Attack: Queensland University of Technology Exploit ............... 34
DoS Attack: RF Jamming Attack......................................................... 36
DoS Attack: Virtual Carrier Attack...................................................... 38
DoS Attack Against Client Station ..................................................................... 40
Laptop Wireless LAN Policy Reference Guide.book Page i Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...