Which of the following is a simple name given to an AP or wireless network?

Successful communication over wireless devices relies on common understanding about the processes or layers involved in interconnection, defined as the open systems interconnection reference model. It also relies on agreement over the rules of engagement, which correspond generally to the way we negotiate the spoken or written language rules: the allocation of radio spectrum frequency bands, identification of devices sending or receiving communications, message packet formation and syntax, and so forth.

A number of standards the organizations operate at the global, country, and industry-specific levels. The organizations with particular significance for wireless communications are discussed here, in addition to the family of standards currently used for wireless interconnectivity.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780128053157000012

Introduction to Networking

Dale Liu, ... Luigi DiGrande, in Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit, 2009

Wireless Access Point

A WAP is a device that allows different types of wireless network cards connect without cables, hence wireless, to connect to LANs and access resources, including the Internet. A WAP plugs into a hub or switch and is the device that joins the unwired network to the wired network. As shown earlier, you can put a router or firewall between the wireless network and the wired network providing a secure barrier between the unsecure wireless network and the secure wired network. WAPs support the standards we defined earlier; if you are using an 802.11b WAP then most 802.11b/g/n cards should be able to access them as they all operate on the same 2 GHz frequency. If you have an 802.11a access point you will need an 802.11a card as this is not in the same frequency as the other standards. There are a few access points that support both the 2 GHz and the 5 GHz range. They are rare and expensive. There are also routers that support wireless connections as well. They range from home use to commercial/business use. For home use, you will find Linksys (a Cisco company) routers that will support both wired and wireless access to digital subscriber line (DSL) or cable Internet connections, all the way up to the Cisco 1800 line that are commercial level routers that include a wireless feature set as well as wired connections. The price range runs from $80 to $5,000 depending on the features and level of router you purchase.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597493062000051

Understanding Network Intrusions and Attacks

Littlejohn Shinder, Michael Cross, in Scene of the Cybercrime (Second Edition), 2008

Logging

Most wireless access points have the ability to log traffic and connections. It is important to consider logging requirements before an incident occurs. Being able to go back to a specific time when an event is thought to have occurred gives the investigator the ability to analyze and determine whether there was indeed a wireless attack on the network.

The logging on most access points does not provide the kind of granularity required for effective logging. You can set up a wireless IDS/IPS to monitor and log any suspicious wireless activity using wireless sensors. These sensors detect malformed wireless packets and log the data for forensic analysis later.

Investigating wireless attacks is difficult due to the nature of the technology. This is exactly the reason attackers like to use this method to gain access to corporate networks. The best solution is to configure your wireless network securely to ensure that hackers will not be able to gain access easily. If a wireless incident does occur, an investigator can use the same tools the attacker used to determine how the attack was done and decide how much information may have been exposed. Proactively reviewing event logs on servers and network devices is always a good step toward identifying attacks early and handling them appropriately.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492768000108

MCSE 70-293: Planning, Implementing, and Maintaining a Security Framework

Martin Grasdal, ... Dr.Thomas W. ShinderTechnical Editor, in MCSE (Exam 70-293) Study Guide, 2003

Administrative Password

When setting up WAPs, the first thing you should do is change the password on the device. Many devices come preset with the Administrator password set to something like admin. Do not leave these devices in their default state. Anyone who knows that you have this hardware could easily change your WAP configuration with this information.

As with any administrative-level password, you should set a strong password on the WAP administrator account. Most WAP vendors provide Web-based administration for performing configuration tasks such as changing the password.

SSID

The SSID acts like a network name for your wireless access device. It has a 32-character identifier attached to the header of data packets that are sent over the WLAN. When this information is sent from the mobile device to the WAP, it acts like a password, in that devices that cannot provide correct SSID information to the WAP will not gain access to the network.

However, the SSID does not provide wireless security for a couple of reasons. First, the SSID is sent over the network in plaintext and is not encrypted. This means that an outsider can use sniffer software to capture the packets being sent over the network and obtain the SSID from them. Additionally, by default, most broadcast their SSIDs, bringing us to the next section.

SSID Broadcasting

SSID broadcasting makes it easy for wireless clients to find the WAP. You don’t even need to know the SSID of the network in order to configure your client to connect; if the WAP broadcasts its SSID, your client computer will automatically intercept it and provide it in the list of wireless networks that are available for you to connect to.

WEP Settings

Another issue to be aware of is that most WAPs do not have WEP enabled by default. Although WEP has some weaknesses (which we’ll discuss in the next section) and is considered by many to provide weak security, it does provide some security and thus should be enabled as a best practice.

Remember that when you enable WEP on the AP, you also must set the client to use it. On a Windows XP client, follow these steps:

1.

Double-click your wireless connection icon in the system tray or in Control Panel and select Network Connections to open the Connection Status dialog box.

2.

Click Properties.

3.

In the Properties box, click the Wireless Networks tab.

4.

Under Available networks, select the SSID of the network you want to configure.

5.

Click the Configure button.

6.

Under the section labeled Wireless network key (WEP), check the check box that says Data encryption (WEP enabled).

7.

If the key is provided automatically, check the check box that says The key is provided for me automatically.

8.

If the key is not provided automatically, enter the key in the field labeled Network key.

9.

Select the Key format (ASCII characters or hexadecimal digits) and the Key length (40 bits for a 5-character key; 104 bits for a 13-character key).

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836937500154

Auditing and Security with Wireless Technologies

Craig Wright, in The IT Regulatory and Standards Compliance Handbook, 2008

Wireless “Hacker” Tools to Evaluate Your Network

This section will introduce a few of the many wireless tools that are freely available. There is an inclusive list of Wardriving Tools, Wardriving Software and Wardriving Utilities at http://www.wardrive.net/wardriving/tools/.

NetStumbler

NetStumbler displays wireless access points, SSIDs, channels, WEP encryption status and signal strength. NetStumbler may be integrated with a GPS to precisely log the location of access points. NetStumbler is covered in more detail later in the chapter.

http://www.netstumbler.com/downloads/

Ap4ff

ApSniff is a 802.11 based wireless access point sniffer for Windows. It can list all access points that are broadcasting beacon signals in its proximity. It is useful for both setting up new APs without interfering with existing APs ApSniff requires a Prism 2 chipset based WLAN cards.

http://www.bretmounet.com/ApSniff

PrismStumbler

Prismstumbler is a WLAN discovery tool. It can scan for beacon frames that have come from access points. Prismstumbler will constantly switch channels to monitors any frames that are received on the currently selected channel and build a list of channels that have APs over time.

http://prismstumbler.sourceforge.net/

WEPCrack

WEPCrack was the first WEP encryption cracking utility. WEPCrack cracks WEP keys.

http://wepcrack.sourceforge.net/

Airsnort

Airsnort is a WLAN tool that was designed to capture and crack WEP encryption keys. Airsnort passively monitors wireless transmissions. It will automatically capture WEP traffic and then compute the encryption key when it has gathered a sufficient number of packets.

http://airsnort.shmoo.com/

WifiScanner

WifiScanner is GPL based software that discovers wireless nodes (i.e. both access points and wireless clients). It requires a CISCOR or prism wireless card chipset to function. It also needs a hostap or wlan-ng driver. It also incorporates an IDS system that may be used to detect anomalies (such as conflicting MAC addresses).

http://wifiscanner.sourceforge.net/

Wellenreiter

Wellenreiter is a GTK and Perl program that is designed for auditing 802.11b wireless networks. The three major wireless card chipsets (Prism2 , Lucent, and Cisco) are supported. It uses an embedded statistics engine that contains the ordinary parameters provided by wireless drivers.

It can discover access-points, networks, and ad-hoc cards. It will detect both SSID-broadcasting and non-broadcasting networks across any channel. Non-broadcasting networks can be discovered automatically. The program will report on the manufacturer and WEP details automatically.

http://www.remote-exploit.org/

WepLab

WepLab is designed as an instruction tool for learning about the functionality of WEP. WepLab is a WEP Security Analyzer designed from an educational standpoint. It will also crack WEP keys.

http://weplab.sourceforge.net/

BTScanner

BTscanner is a tool that extracts as a huge quantity of information from a Bluetooth device without being required to first pair. A detailed information screen collects HCI and SDP information, maintaining an open connection that is used to monitor both RSSI and link quality. BTScanner is based on the BlueZ Bluetooth stack, included in modern Linux kernels. It is possible to estimate the host device type from the information supplied from the tool.

http://www.pentest.co.uk/cgi-bin/viewcat.cgi?cat=downloads

FakeAP

Fake AP by Black Alchemy produces a voluminous quantity of bogus 802.11b access points. It can be used as a component of a wireless honeypot or to confuse attackers. Fake AP confounds many wireless scanners.

http://www.blackalchemy.to/

Kismet

Kismet is an 802.11 based wireless network detector, sniffer, and intrusion detection system. Kismet identifies networks through passively collecting packets and detecting networks that are defined using standard names. It can also detect hidden networks, and infer the existence of any non-beaconing networks via data traffic. KISMET is covered in more detail later in the chapter.

http://www.kismetwireless.net/

Mognet

Mognet is an open source wireless (GPL) Ethernet sniffer and analyzer. It is written in Java. It performs well on handheld devices such as a PDA.

http://node99.org/

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492669000126

FortiGate Hardware Overview

Kenneth Tam, ... Josh More, in UTM Security with Fortinet, 2013

FortiAP

FortiAP is an 802.11x wireless access point (AP) offering. As of this writing there are three commercial grade FortiAP models offered by Fortinet, FortiAP-210B, FortiAP-220B, and FortiAP-222B. All three models support 802.11a/b/g/n standards and operate on both 2.4 GHz b/g/n and 5 GHz a/n spectrums. The 210B has single radio whereas the other two have two radios. The 222B can be used outdoors unlike the other two models which are indoor only. Each radio supports multiple wireless clients with ability to span across multiple wireless network segments each with its own SSID and with different access rights. Having multiple radios in a single FortiAP provides options for dedicating certain wireless frequency spectrums to specific uses. A radio could also be dedicated for wireless rogue AP (Access-Point) detection. Rogue detection provides another layer of defense by detecting unauthorized access points being used in your network environment. In addition, on-wire rogue AP detection is possible by leveraging the dedicated wireless radio detected rogue AP MAC address and correlating the FortiGate wireless controller MAC entries from potential wireless user client using the rogue AP on the network. If a rogue AP is detected on your physically connected network (on-wire), the FortiGate has the ability to suppress and block network activities coming from the discovered rogue AP. These APs are used in conjunction with the FortiGate UTM solution acting as a wireless controller for the AP and providing fast roaming capabilities between FortiAPs. The wireless controller function is included in almost all FortiGate models (check datasheet to confirm support). With the FortiGate providing the wireless controller functionality, it adds additional benefit for a secure wireless infrastructure by leveraging all the FortiGate offered UTM features. For further details on the FortiGate built-in wireless controller feature will be covered in Chapter 7 of this book.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597497473000028

Understanding Antennas and Antenna Theory

Chris Hurley, ... Brian Baker, in WarDriving and Wireless Penetration Testing, 2007

Security Audit/Rogue Hunt and Open Penetration Testing

A “rogue” wireless access point (or router) is an unauthorized access point that has been placed on a company LAN behind a corporate firewall. These devices are usually left in their factory default state and are completely open and unsecured. Often installed by a company employee who “just wants wireless in my office,” they fail to understand that a device in that state is equivalent to running it a Category 5 UTP Cable out the window and into the parking lot, where any passerby can use it.

As a matter of course, any company with a LAN should be running routine checks or “rogue hunts” for unauthorized APs as part of their regular network security audits. Often, wireless is neglected because a company does not have any authorized wireless, therefore, it believes that it can safely disregard any wireless checks. Unfortunately this attitude ignores the possibility of any rogue devices being been installed by an unauthorized employee or attacker. A wireless search should be part of any routine security audits.

The information technology worker that is charged with the wireless portion of the audit needs several different types of antennas. First, a low- to moderate-gain omnidirectional antenna in the 5 to 7dBi range is needed for checking the perimeter of a building or campus. This check should be for rogue devices and to see how far the wireless footprint of authorized devices can reasonably be detected from the building or campus.

Next, a moderate gain directional antenna of about 15dBi is needed to confirm that any detected wireless networks lay inside or outside of the audited area. If the detected wireless networks are authorized, or if they are unauthorized but outside of the area, then the wireless portion of the audit may be concluded. If not, then a low gain directional antenna of 8 to 10dBi, or a moderate gain antenna combined with attenuators is needed to track down the location of rogue APs.

This is similar to anyone conducting an open penetration test. Since the test is being conducted with the full knowledge of the company employees, the functions are almost identical to that of the corporate employee conducting a wireless security audit. The worker conducting the open penetration test may want to obtain a higher gain omnidirectional antenna to see how much further out the wireless footprint can be detected, or to conduct any penetration test some distance from the site.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597491112500271

Looking Ahead: Cisco Wireless Security

Eric Knipp, ... Edgar DanielyanTechnical Editor, in Managing Cisco Network Security (Second Edition), 2002

Exploiting Those Weaknesses

A well-configured wireless AP will not stop a determined attacker. Even if the network name and SSID are changed and the secret key is manually reconfigured on all workstations on a somewhat regular basis, the attacker will still take other avenues to compromise the network.

If easy access is available near to the wireless network, such as a parking lot or garage next to the building being attacked, the only thing an attacker needs is patience and AirSnort orWEPCrack. When these applications have captured enough “weak” packets (IV collisions, for example) they are able to determine the secret key currently in use on the network. Quick tests have shown that an average home network can be cracked in an overnight session. This means that to ensure your network protection, you would need to change your WEP key at least two times per day, or keep your eyes open for any vehicles that look suspicious (with an antenna sticking out the window, for instance) parked outside your home or business for hours or days at a time.

If none of these network tools help in determining which default configurations to try, the next step is to scan the traffic for any cleartext information that might be available. Some manufacturers, such as Lucent, have been known to broadcast the SSID in cleartext even when WEP and closed network options are enabled. Using tools such as Ethereal (www.ethereal.com) andTCPDump (www.tcpdump.org) allow the attacker to sniff traffic and analyze it for any cleartext hints they may find.

As a last option, the attacker will go directly after your equipment or install their own. The number of laptops or accessories stolen from travelers is rising each year. At one time these thefts were perpetrated by criminals simply looking to sell the equipment, but as criminals become more savvy, they are also after the information contained within the machines. Once you have access to the equipment, you are able to determine what valid MAC addresses can access the network, what the network SSID is, and what secret keys are to be used.

An attacker does not need to become a burglar in order to acquire this information. A skilled attacker will utilize new and specially designed malware and network tricks to determine the information needed to access your wireless network. A well-scripted Visual Basic script that could arrive in e-mail (targeted spam) or through an infected Web site can extract the information from the user’s machine and upload it to the attacker.

With the size of computers so small today (note the products at www.mynix.com/espace/index.html and www.citydesk.pt/produto_ezgo.htm), it wouldn’t take much for the attacker to simply create a small AP of their own that could be attached to your building or office and look just like another telephone box. Such a device, if placed properly, will attract much less attention than someone camping in a car or van in your parking lot.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781931836562500192

Building penetration test labs

Jeremy Faircloth, in Penetration Tester's Open Source Toolkit (Fourth Edition), 2017

Isolating the network

Because penetration testing can be a dangerous activity, it is imperative that a penetration test lab be completely isolated from any other network. This produces some problems, such as having no internet connection to look up vulnerability and exploit information or to download patches, applications, and tools. However, to guarantee that nothing in your network leaks out, you must take every precaution to make sure your network does not communicate with any other network.

Admittedly, this becomes problematic when your network contains wireless appliances. In most cases, penetration testing is conducted over wired connections, but on occasion wireless networks are valid penetration testing targets. This presents a difficult question: How do you isolate a penetration test lab with wireless access from other networks? The answer: You do not; it is not necessary.

To explain what that means, we’ll talk a bit about the objective of hacking a wireless access point. In a real penetration test involving a wireless network (or any network, for that matter), first the penetration test team needs to gain access to the network. It doesn’t matter whether that connection is via the wireless portion of the network or a plug in the wall. All that matters is that access is established. Once the network access is accomplished, the penetration testers move on to selecting targets using techniques that work over either wireless or wired networks (it does not matter which).

So, back to the question of how you isolate a penetration test lab with wireless access: You should have two separate labs: a wireless lab where you only practice breaking into the wireless access point and a separate lab where you conduct your system attacks. Once you feel confident you can break into the network over the wireless lab, you should move over to the wired penetration test lab and give yourself the same access to that network as what you would have by penetrating the wireless access point. That way, all future attacks are isolated and are not exposing other networks to your efforts. In addition, your activities cannot be monitored, which is (obviously) not necessarily the case over a wireless network.

In situations in which multiple wireless access points are in the vicinity of your wireless lab, you must be extremely careful that you attack only your lab and no other wireless network. After scanning for wireless networks, make absolutely certain that any cracking against the access point is really performed against your intended target. It is sometimes extremely easy, especially with automated tools, to test an unintended target. This can have very negative consequences.

Epic Fail

A scenario occurred where a security researcher set up a wireless lab at his home which is located near a police station. It turned out that the local police department had the same wireless configuration he had intended to use for testing purposes. After further reviewing the discovered networks, he noted that the police department set up their wireless access point with no encryption. Needless to say, if he had simply started some automated tools and started to hack away, he might have been hacking an access point owned by the police. It is unlikely that they would have taken kindly to his activities.

The good thing about wireless attacks is that the standard practice is to pinpoint your attacks against one access point using the Media Access Control (MAC) address unique to your lab’s wireless access point. As long as you are careful, there should be no problem. However, if this is not acceptable, it is possible to shield a room from leaking out radio waves (which we will not cover in this chapter). If you or your employer decides it is important enough to do, you can create a completely isolated wireless network with enough effort and funding. Whatever you do, just understand that you will be dealing with viruses, worms, and more, which can quickly bring any network to its knees.

What is another name for a wireless access point?

A WAP is also known as a hotspot.

What is the name of a wireless network?

A wireless LAN (WLAN) is a wireless computer network that links two or more devices using wireless communication to form a local area network (LAN) within a limited area such as a home, school, computer laboratory, campus, or office building.

What is a wireless AP device?

An access point is a device that creates a wireless local area network, or WLAN, usually in an office or large building. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a WiFi signal to a designated area.

What are the 3 main types of wireless networks?

There are basically three different types of wireless networks – WAN, LAN and PAN: Wireless Wide Area Networks (WWAN): WWANs are created through the use of mobile phone signals typically provided and maintained by specific mobile phone (cellular) service providers.