
68
Chapter 3: IDS—Security Penetration
AirMagnet Laptop Wireless LAN Policy Reference Guide
with username and password credentials. It could also simply give
out non-functional and non-routable IP addresses to achieve a Denial
of Service attack. This sort of attack is generally against a WLAN
without encryption, such as hotspots or trade show networks.
AirMagnet Mobile detects such wireless STAs running the DHCP
service and providing IP addresses to unaware users. Once the client
is identified and reported by AirMagnet Mobile, the WLAN
administrator may use the FIND tool to locate the device.
Figure 3-7: The AirMagnet Mobile FIND tool locates devices by tracking
down the signal level
Hotspotter Tool Detected
A hotspot is any location where Wi-Fi network access is made
available for the general public. One often finds hotspots in airports,
hotels, coffee shops, and other places where business people tend to
congregate. It is probably one of the most important network access
service for business travelers these days. All the customer requires is
a wireless enabled laptop or handheld. Then the user can connect to
the legitimate access point and get the service. Most Hotspots do not
require the user to have any advanced authentications mechanism to
connect to the access point, other than popping up a webpage for the
Laptop Wireless LAN Policy Reference Guide.book Page 68 Thursday, January 25, 2007 5:36 PM
Содержание PRG-Laptop 7.0
Страница 1: ...AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 8: ...vi Table of Contents AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 30: ...22 Chapter 1 Configuration Vulnerabilities AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 64: ...56 Chapter 2 IDS Denial of Service Attack AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 136: ...128 Chapter 5 Authentication and Encryption AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 138: ...130 Part Two Performance Intrusion AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 144: ...136 Chapter 6 Channel or Device Overload AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 192: ...184 Chapter 9 Problematic Traffic Pattern AirMagnet Laptop Wireless LAN Policy Reference Guide...
Страница 210: ...196 Chapter 10 RF Management AirMagnet Laptop Wireless LAN Policy Reference Guide...