
ii
Table of Contents
AirMagnet Laptop Wireless LAN Policy Reference Guide
DoS Attack: Authentication-Failure Attack ......................................... 41
DoS Attack: De-Authentication Broadcast .......................................... 43
DoS Attack: De-Authentication Flood ................................................. 44
DoS Attack: Disassociation Broadcast................................................. 46
DoS Attack: Disassociation Flood ....................................................... 47
DoS Attack: EAPOL-Logoff Attack .................................................... 49
DoS Attack: FATA-Jack Tool Detected .............................................. 50
DoS Attack: Premature EAP-Failure Attack........................................ 52
DoS Attack: Premature EAP-Success Attack ...................................... 54
Chapter 3: IDS—Security Penetration ......................................57
Airsnarf Attack Detected .................................................................................... 57
Fast WEP Crack (ARP Replay) Detected........................................................... 60
Device Probing for APs ..................................................................................... 61
Dictionary Attack on EAP Methods ................................................................... 64
EAP Attack Against 802.1x Authentication Type.............................................. 65
Fake APs Detected.............................................................................................. 66
Fake DHCP Server Detected .............................................................................. 67
Hotspotter Tool Detected.................................................................................... 68
Illegal 802.11 Packets Detected.......................................................................... 71
Man-in-the-Middle Attack Detected................................................................... 72
Monitored Device Detected ................................................................................ 74
NetStumbler Detected ........................................................................................ 75
Potential ASLEAP Attack Detected ................................................................... 76
Potential Honey Pot AP Detected....................................................................... 78
Publicly Secure Packet Forwarding (PSPF) Violation ....................................... 80
Soft AP or Host AP Detected ............................................................................. 81
Spoofed MAC Address Detected........................................................................ 82
Suspicious After-Hour Traffic Detected............................................................. 83
Unauthorized Association Detected ................................................................... 84
Wellenreiter Detected ......................................................................................... 87
Chapter 4: Rogue AP and Station ..............................................89
Rogue AP............................................................................................................ 90
Laptop Wireless LAN Policy Reference Guide.book Page ii Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...