Wireless Operational Security

W

War-chalking, 194 “95

War-dialing, 194

War-driving, 194

War-flying, 195

Warning banners, 170

Web applications security, 85 “93

application-based attacks, 86

application layer standards, 91

code reviews, 92

data link layer standards, 91

development, 85 “93

enforcement techniques, 92 “93

feature standardization, 90 “91

patching, 93

portability, 86

secure code design, 92

secure configuration, 92

testing for loopholes, 92 “93

transport and network layer standards, 91

Web-based attacks, 87 “90

Web-based attacks, 87 “90

backdoors, 90

configuration subversion, 90

cookie poisoning , 88 “89

forceful browsing, 89 “90

hidden manipulation, 87 “88

method, 87

parameter tampering, 88

stealth commanding , 89

vendor-assisted hacking, 90

WEP, 125, 224

cracking, 224

decryption tools, 201

dynamic, 227 “40

effectiveness, 224

LEAP benefits over, 330

using, 226 “27

weaknesses, 225 “26

Wide Area Networks (WANs), 49

WiFi Protected Access (WPA), 125, 223, 302 “5

authentication, 304

backward compatibility, 303

defined, 302

features, 303 “5

introduction, 303

key management, 304

MIC, 304

mixed-mode deployment, 304 “5

TKIP, 303 “4

upgrades, 303

Win32.Sobig.F worm, 172 “74

Windows NT L0phtCrack, 41

Windows Security Access Manager (SAM), 207

WinSniffer, 205 “6

Wired Equivalent Privacy. See WEP

Wireless bridges, 214 “15

Wireless cards, 210

Wireless Integrated Secure Data Options Model. See WISDOM

Wireless LANs. See WLANs

Wireless Personal Area Networks (WPANs), 123

Wireless protocol analyzers, 208 “9

Wireless public-access networks, 182 “83

recommendations, 182 “83

security issues, 182 “83

security vulnerabilities, 220 “21

Wireless Robust Authenticated Protocol (WRAP), 302 “3

Wiretapping procedures, 103

WISDOM, 309 “56

applying, 315 “55

defined, 115, 309

WISDOM Advanced Security, 343 “55

ARP spoofing, 354

client's WLAN without IPSec protection, 349

connectivity to Internet services, 347 “48

defined, 343

design features, 348, 355

DHCP IP configuration protocol spoofing, 352

DNS and DHCP server application protocols, 349

IP spoofing, 353

MAC/IP spoofing from unauthenticated users, 355

man-in-the-middle attacks, 351

password attacks, 354

requirements, 343

topology, 348

unauthorized network topology discovery, 355

VPN appliance use, 344

wireless packet sniffers against WLAN clients , 350

WISDOM Basic Security, 315 “28

AP ad hoc mode, 319

AP administrative password, 320

AP channel cross-over, 322

AP default setting of "no encryption," 317

AP default shared key, 321

AP Ethernet MAC ACLs, 318

AP placement, 320

AP reset function, 321

AP shared key authentication, 317

AP SSID broadcast, 316

AP user password, 319

bridge-to-bridge eavesdropping, 323

defined, 315

DHCP server, 328

elements, 316 “28

encryption key length, 322

features, 315

filtering controls, 326

MAC spoofing, 324

rogue access points, 325

security patches/upgrades, 327

SNMP agents , 327

topology, 316

WLAN eavesdropping, 322

WISDOM Intermediate Security, 328 “43

AP user password, 334

ARP spoofing, 341

broadcast monitoring, 338

cleartext WEP IV, 336

defined, 328

design features, 331 “32

elements, 333 “43

IP spoofing, 340

man-in-the-middle attacks, 343

password attack, 333

RC4 encryption key weaknesses, 337

replay attacks against WEP, 339

static MAC addresses, 334

static WEP key, 335

topology, 329, 332

unauthenticated access, 334

unauthorized access, 334

unauthorized network topology discovery, 341

vendor-neutral solution, 328

WEP cryptographic integrity, 337

WEP integrity and confidentiality attacks, 333

WEP IV weaknesses, 335

WEP vulnerabilities elimination , 331

wireless packet sniffers, 342

WLANs, 117 “28

accessing, 119

advantages, 120

attacks, 200 “201

audit and discovery tools, 196 “98

authentication, 283 “301

bandwidth, 119

Bluetooth, 123 “24

capacity, 127

components , 119

current standards, 121 “22

defined, 117

design solutions, 188

disadvantages, 121

encryption schemes, 150 “56

exploitable configurations, 199

functioning of, 119 “20

future standards, 122 “23

implementation concerns, 127 “28

intrusion process, 191 “222

intrusions, 115

malicious code/file insertion, 217 “20

network discovery tools, 198

networking utilities, 198 “99

performance, 126 “27, 128

planning, 127

power consumption, 128

power over Ethernet, 128

public-assess security issues, 182 “83

in public space, 187 “88

rate limitation, 270

risk management, 177 “81

security, 125 “26

security, enhancing, 260 “70

security checklist, 183 “87

security costs, 310 “12

security management considerations, 313 “15

security policies, 159 “77, 314 “15

security solution weaknesses, 221 “22

segmentation devices, 260 “67

subnet roaming, 270 “71

threat and impact analysis, 312

transmission speeds, 126

uses, 117 “18

UWB, 124

Worms, 218 “19

Категории