Page 216 - DCAP311_DCAP607_WIRELESS_NETWORKS
P. 216
Wireless Networks
Notes z z Determine why and where to capture wireless traffic. To get quality wireless signal, try
your best to get close to the object that you want to monitor wireless traffic from.
z z Install wireless monitoring software on your pc or laptop. You can find lots of wireless
traffic sniffer tools on the web. And lots of them are freeware.
z z Prepare a wireless adapter. Some wireless monitor tools require specific wireless adapter
or specific driver. So you may need to get one wireless adapter for your wireless traffic
monitor software.
z z Get wireless security key for the wireless network if it uses encryption. It’s often that
wireless networks implement encryption for security purposes. So you need the key for
the wireless traffic monitor software to decode the wireless data.
13.3.2 Additional Equipment
Because wireless traffic transmits in air, it’s helpful if you have better equipment to perform
wireless traffic monitoring. Equipment that may be useful for wireless traffic monitoring includes:
z z a wireless network card supports 802.11a, b, g, n
z z an omni-directional antenna
z z a high-gain yagi directional antenna
z z pigtail cables for the yagi and omni-directional antenns
z z a USB GPS adapter
13.4 Unauthorized Access
The modes of unauthorised access to links, to functions and to data is as variable as the respective
entities make use of program code. There does not exist a full scope model of such threat. To
some extent the prevention relies on known modes and methods of attack and relevant methods
for suppression of the applied methods. However, each new mode of operation will create new
options of threatening. Hence prevention requires a steady drive for improvement. The described
modes of attack are just a snapshot of typical methods and scenarios where to apply.
z z Non-traditional networks: Non-traditional networks such as personal network Bluetooth
devices are not safe from cracking and should be regarded as a security risk. Even barcode
readers, handheld PDAs, and wireless printers and copiers should be secured. These non-
traditional networks can be easily overlooked by IT personnel who have narrowly focused
on laptops and access points.
z z Identity theft (MAC spoofing): Identity theft (or MAC spoofing) occurs when a cracker
is able to listen in on network traffic and identify the MAC address of a computer
with network privileges. Most wireless systems allow some kind of MAC filtering to allow
only authorized computers with specific MAC IDs to gain access and utilize the network.
However, programs exist that have network “sniffing” capabilities. Combine these
programs with other software that allow a computer to pretend it has any MAC address
that the cracker desires, and the cracker can easily get around that hurdle.
MAC filtering is effective only for small residential (SOHO) networks, since it provides
protection only when the wireless device is "off the air". Any 802.11 device "on the air" freely
transmits its unencrypted MAC address in its 802.11 headers, and it requires no special
equipment or software to detect it. Anyone with an 802.11 receiver (laptop and wireless
adapter) and a freeware wireless packet analyzer can obtain the MAC address of any
transmitting 802.11 within range. In an organizational environment, where most wireless
210 LOVELY PROFESSIONAL UNIVERSITY