
AirMagnet Laptop Wireless LAN Policy Reference Guide
Chapter 3: IDS—Security Penetration
59
Airsnarf, a shell script based tool creates a hotspot complete with a
captive portal where the users enter their login information.
Important values such as local network information, gateway IP
address, and SSID can be configured within the airsnarf
configuration file. This tool initially broadcasts a very strong signal,
that will disassociate the hotspot wireless clients from the authorized
AP connected to the Internet. The wireless clients assuming that they
were temporarily disconnected from the Internet due to some
unknown issue, will try to login again to resume their activities.
Innocent wireless clients that associate to the Airsnarf access point
receive the IP address, DNS address, and gateway IP address from
the rogue Airsnarf Access Point instead of the legitimate AP installed
by the hotspot operator. The users will be shown a webpage that
requests a username and password as now the DNS queries are
resolved by the rogue Airsnarf AP. The username and password
entered will be collected by the hacker.
The user name and password can be used in any other hotspot
location of the same provider anywhere in the nation without the
user realizing the misuse. The only case where it could have lesser
impact is if the hotspot user is connected using a pay-per-minute
usage scheme.
The Airsnarf tool can also penetrate the laptop clients that are
unknowingly connected to the Airsnarf AP. The AirSnarf tool can be
downloaded by hackers from
http://airsnarf.shmoo.com/
AirMagnet Mobile will detect the wireless device running the
AirSnarf tool. Appropriate action must be taken by the administrator
to locate remove the AirSnarf tool from the WLAN environment. The
Find tool can be used for this purpose.
Laptop Wireless LAN Policy Reference Guide.book Page 59 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...