+ All Categories
Home > Documents > © 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet...

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet...

Date post: 26-Dec-2015
Category:
Upload: robert-james
View: 213 times
Download: 0 times
Share this document with a friend
69
Transcript

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

www.iss.net

Wireless Security

Michael H. WarfieldSenior Researcher and FellowISS X-Force

August 10, 2006

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

This presentation is also available on-line:

http://www.wittsend.com/mhw/2006/Wireless-Security-ALE

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Outline

Introduction and Standards Common Uses and Abuses Security Incident Examples Access Control and Confidentiality Securing Wireless Networks Closing Summary and References

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Introduction

Many forms of wireless Point-to-point Wi-Fi / 802.11 WiMax / 802.16 Mobile Broadband / 802.20 Bluetooth 3rd Generation Cellular, EVDO, GPRS, Wireless Broadband

Wi-Fi is becoming ubiquitous Cheap and easy and popular

Wireless is incredibly flexible Cost effective compared to hard wired networks Works in harsh environments Works in mobile environments

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Wi* 802.* Standards(Alphabet Soup?)

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.11

IEEE ratified in 1997 General wireless standards family

Has now grown to include 6 over-the-air modulation protocols Lots and lots of protocol amendments

2.4 GHz shared unlicensed band Covered by FCC Part 15 regulations Initially 1-2 Mbps Poor performance Poor acceptance

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.11a

IEEE Ratified in 1999 First ship in 2001 5 GHz unlicensed band 54 Mbps High Performance Costly Poor range Adoption was slow and poor

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.11b

IEEE ratified in 1999 2.4Ghz shared unlicensed Band Up to 11Mbps Moderate Performance Relatively inexpensive Moderate range (twice that of 802.11a) Moderate interference from other services Quickly became very popular

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.11g

IEEE ratified in June 2003 Shipping in January 2003 2.4GHz shared unlicensed band 54 Mbps (Super G bounding to over 100 Mbps) Good Performance Inexpensive (dirt cheap) Powerful (many have third party upgrades) Compatible with 802.11b

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.11n

100+ Mbps Compatible with 802.11b and 802.11g Upcoming standard Multiple proposals submitted No consensus as of yet

Continuing disagreements are delaying final standardization Availability is poor Cost is relatively high

MIMO – 802.11n preview?

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.11s

IEEE Working group first met in July 2004 802.11 w/ Mesh topology Intel early proposal for 802.11s Builds on 802.11 a/b/g Should be applicable to 802.11n No current standards for 802.11 mesh Access points and nodes autonomously relay packets Self organizing and extensible

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.1X

IEEE standard for Network Access Controls Applies to both wired and wireless networking

There is no 802.11X Common misunderstanding

Instantiated in the 802.11i wireless standard Incorporates a number of authentication methodologies

PSK – Pre-Shared Keys EAP – Extensible Authentication Protocol LEAP – Cisco Limited Extensible Authentication Protocol Radius

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.16

WiMax WorldWide Interoperability of Microwave Access 802.16a – Metropolitan Area Network 802.16e – Moble Broadband Other amendments address other concerns in the standard

Both Licensed and Unlicensed modes Higher power Broader coverage Sprint selecting WiMax for Mobile Broadband

Anticipated network rollout in 4th quarter of 2007

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Common (and Uncommon) Uses

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Hotspots

Hotspots are publicly accessible wireless zones Pay and free hotspots are proliferating Most airports now have hotspots

Some are free, some for pay Some hotels are opting for wireless for broadband

Some are teaming up with wireless providers Some coffee chains have wireless for customers

Some shops are dealing with customers who won't leave Some shops dealing with users in parking lots

Some people set up hotspots just for kicks Some criminals set up hotspots looking for victims

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Neighborhood Networks

Cul-De-Sac Area Networks (CDSAN)? High power APs cover a couple of small streets Antennas extend range even further YES! You really CAN be the ISP for your entire cul-de-sac! Example neighborhood net in Canada

Broadband VoIP Video Being commercialized for businesses

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Municipal WiFi

Municipalities considering WiFi as a utility Antennas / Access Points on lights and utility poles Mesh networking avoids need for wired backbones WiMax may extend range and coverage Uniform coverage and management Narrows “the digital divide” Provides additional emergency services backup Conflicts with commercial competition Mixed legislative actions Some active deployments

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Communities

Philadelphia Proposal for community WiFi resulted in state legislation to prevent it Philadelphia has an exemption in resulting legislation

San Fransisco Google initially contracted to providing free service

New Orleans Free service in aftermath of Katrina using donated equipment BellSouth reported to have withdrawn a donation as a result

Boston May contract with a non-profit to run city-wide WiFi

Washtenhaw County, MI County wide WiFi deployment approved 85Kbps Free, 500Kbps $35/month

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Wireless Police Knocking?

New York Westchester County New York proposed mandatory WiFi security Encryption is NOT mandatory Security is mandatory even WITH encryption

Canola Ranch Resorts Tucson condo resort Provides wireless and broadband to each unit Covenants require that all wireless be secured This one requires encryption

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Wireless VoIP

Wireless PBX Great for mobile employees

Hospitals Schools Conference Centers

Cost effective Versatile Isolated Access Points and networks control security Potential eavesdropping / sniffing threats Some cell phones now support cellular plus VoIP on

802.11*

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Industry and Agriculture

Supports mobile equipment Farm equipment in the field Mobile factory floor equipment and employees

Eases deployment and installation Wiring problems in old installations Connections between buildings

Aids with hostile environments Not merely end networking services Part of the industrial process

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Personal Area Networks

Wireless cards and access points are as cheap as network interfaces now

Employees may install APs under desks for their laptops Convenient for home-to-office road warriors Home lan security problems may become corporate lan

security problems Unauthorized or rogue access points can create gaping

security holes Open workstations can open up your wired network

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

WiFi Defense Against the RIAA???

Two recent court cases decided against the RIAA Argued that an IP address is not a person Evidence of pervasive activity Evidence of access by others in the home Each case was settled and dismissed

Use an open access point to argue others may have access? Neither case resulted in a judgment

No legal precedent Both cases presented evidence of others in the home

Hand waving arguments are unlikely to work Other evidence may be brought into play (on either side)

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Trick Out Your WiFi Router!

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Trick Out That Router

LinkSys WRT54GS Router “Linux based” version 100 MBit “Speed Booster” Has more RAM and Flash than the G / GL

Add high gain antennas Cheap pair of 7 db Onmi D-Link directional Larger 11 db omni “billy club”

Add run of low-loss coax to the attic for antenna height Add range extenders (repeaters) Upgrade to 3rd party firmware Add “mesh” or WDS access points

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

DD-WRT Firmware

Based on Sveasoft Talisman release Based on Linksys sources and OpenWRT sources

Adjustable power (26 mW -> 250 mW) Multiple VLAN's and VPN's Supports many many vendors (not just Linksys) and

models Multiple ESSID's per access point WEP / WPA / WPA2 / Radius support OpenVPN IPv6 VoIP Kismet (an access point that can wardrive as well) Turns that $60 router into a $600 super performer

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Common (and Uncommon) Abuses

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Wardriving

Popular sport Simple as a PDA A small mobile antenna is non-intrusive Pringles cans are cheap and effective antennas Good directional antennas can work for miles Automated tools build wardriving maps with gps Majority of access points have no encryption! Majority of access points use default settings! An FBI representative has stated that wardriving and

warchalking are legal (but bandwidth theft is not).

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Inverse Wardriving

Wardriving with an Access Point Linux based access points have extra features

Extra power Remote command line Can run Kismet on the Access Point

Trolling for open clients willing to connect Many workstations are enabled for “any” AP Can compromise associated wired networks Early tests were run at Democratic National Convention Windows was vulnerable to an Ad-Hoc Evil Twin

Wardriving Windows boxes would probe for previous connections Attacker could emulate other access points based on probes

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Open Workstations

Easy and common to “attach” to the “wrong” access point Many laptops come with built-in WiFi WiFi may be enabled without realization Difficult to lock down laptops to limited connections Open workstations may be contaminated outside of security

perimeters Open workstations may bridge wireless to wired networks Home users may bring wireless enabled into the workplace WiFi policy must include workstation setups!

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Driver Attacks

Workstations may be directly attacked through WiFi drivers They don't have to be in use Workstation does not have to be connected to a WiFi network User may not even realize WiFi is enabled

Recent BlackHat 2006 demonstration Demonstration was video only

(They were practicing safe WiFi)

Attack against Mac OSX Other operating systems also vulnerable to similar attacks

Demonstrated against third party drivers Native drivers are also vulnerable

Recent Intel security advisory on the Centrino WiFi drivers

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Evil Twin

Variation on the “inverse wardriving” Evil access point mimics existing access point ESSID Looking for specific networks Not just for promiscuous workstations Increased power can override legitimate access points Evil twins can be more difficult to find than rogues

Kismet can spot “time stamp” anomalies from Evil Twins Shield from within, shield from without May be used for WiPhishing

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

SSL Attacks

Some sites use SSL to protect admin access to web interface Some access points used a static server certificate SSL does not provide for “Perfect Forward Secrecy” SSL does not provide for “Diffie Hellman Key Exchange” in

default “server authenticated” sessions Access point firmware readily available for download Static certificate from access point firmware image allows

attackers to intercept and decrypt the SSL traffic!

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Broadcast Leakage

Access points will broadcast LAN broadcast packets Local LAN or directed broadcasts Netbios is extremely “chatty”

Workstation names Domain / Workgroup names Login (user) names Services

ARP requests Network mapping ARP cache poisoning

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Hotspot Battles

Only 11 channels in North America Competition with and between fee services

Providers have set up fee based wireless access Cybercafes have set up wireless services Competing individuals have used directional antennas to

broadcast into competing locations Organizations have set up free hot spots

Companies seeking to set up services for a fee have come into conflict with community hotspots

Some hot-spots in airports have become free WiFi spectrum overlaps with some Amateur Radio

Amateurs use much more power Accidental cross access and cross interference have occurred

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Security Incidents(What were you thinking?)

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Information Leakage

Information may leak from insecure wireless networks Networks may be routed over wireless links Information may leak in broadcast messages Attackers can use techniques such as “arp cache poisoning”

to intercept and redirect traffic Schools have had student data accidentally exposed through

wireless networks What's your legal liability?

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Threats to Reputation

Wireless is easy to use for inappropriate activity Retail chains have used wireless for temporary cash

registers Researchers have found insecure wireless nets

broadcasting sensitive customer information Publication of wireless leaks have lead to major public

relations incidents for several companies What if the researchers had been “bad guys”? (Some have been)

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Computer Break-ins

Major hardware chain had an insecure wireless network in Michigan

Intruders used it to break into the home office computers in North Carolina

Law enforcement contacted but access not shut down during investigation

Intruders were caught sitting in the parking lot during a subsequent break-in

Intruder sentenced to 9 years in jail though he failed! What about using a high gain directional antennas?

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Spammers

Drive-by-spamming is taking place Spammers can send millions of E-Mails in minutes Your servers get blamed Your abuse people get harassed Your company gets blacklisted

California man plead guilty to spamming people through unprotected hotspots Convicted under Can-Spam Act What about wireless theft?

Also being used to launch phishing scams

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Extortionists

Extortionists have exploited open access points Maryland man used unsecured wireless networks to make

“untraceable” threats and extortion demands Threats traced to homes and a dentist's office Caught by his demand for money

(Make the check payable to...)

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Simple Bandwidth Theft

Individual in Florida observes someone sitting in his neighborhood playing with a laptop Individual hides laptop whenever people approach Individual still present several hours later Suspicious behavior reported to police Police find the suspicious individual using WiFi Charged with theft of bandwidth Other charges pending? Neighborhood watch?

Coffee shop tired of non-customer in parking lot Asked to leave several times Charged with theft of bandwidth after several months

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Other Illegal Activities

Canadian police caught an individual driving the wrong way down a one-way residential street

Individual had wardriving equipment in the car Individual had been exploiting open residential access

points to download child pornography Additional charge: Theft of telecommunications What if it was your access point? How would you explain the network activity to law

enforcement?

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Denial of Service

Various Denial of Service attacks possible “Omerta” disassociate attacks disconnect workstations

Also useful in WPA-PSK attacks RF attacks overwhelm channels and spectrum Overpowered access points generate interference General congestion and channel crowding RF “Ping of Death” Unlicensed services are not protected from RF interference

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Access and Confidentiality

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Gateway Control

Access control through an application gateway Use web site authentication to open a firewall Little or no link level security Wireless traffic may be sniffed Very common in hotels Very common in paid-for “hot spots” Somewhat common at universities Prone to “information leakage” Prone to MAC hijacking

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

MAC level access control

Access granted based on MAC address No protection from sniffing MAC addresses may be spoofed or hijacked Business often have batches of MAC addresses Administrative headache to maintain MAC tables Does not scale well In really POOR implementations, multiple WiFi clients can

share MAC addresses and get away with it. MAC access control Block ICMP Use orthogonal activity (difference servers and services)

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

VLAN access control

Combination of Gateway and MAC using VLANS VLAN assigned based on MAC address Gateway access control switches MAC between VLANS Scales much better than pure MAC level access Still has disadvantages of both

No protection from sniffing MAC addresses may be spoofed or hijacked Business often have batches of MAC addresses

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

SSID Access Control

SSID broadcast (Wi-Fi network name) Cloak a network by disabling SSID broadcast Network can still be probed and uncloaked Network traffic can still be sniffed SSID can be determined from other traffic Automated tools are designed to collect information about

cloaked networks Useful for network selection control Little use as access control Can help with network selection control Does indicate that this is NOT a public network

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

To SSID or Not To SSID

Advantages to broadcasting SSID / ESSID Autodetection of Networks by workstations

Disadvantages to broadcasting SSID / ESSID Closed network names appearing on foreign workstations Potential for accidental connections (if not encrypted)

Advantages to NOT broadcasting SSID / ESSID Notice: “This network is not public” Accidental connections highly unlikely

Disadvantages to NOT broadcasting SSID / ESSID Manual configuration of networks and workstations “False sense of security”

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

WEP

Wire Equivalent Privacy IEEE standard adopted in 2000 Simple shared key encryption

40/56 bit DES (export grade - worthless) 128 bit RC4

Weakness unveiled in 2001 led to many attacks Design is vulnerable to plaintext codebook attacks Some implementations are extremely insecure

Recent attacks effective against all variations Really poor design – even worse implementations Some older implementations worse than others

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

WPA

Wireless Protected Access Based on subset of IEEE 802.11i draft WiFi Alliance interim specification Can use preshared keys (PSK – WPA Personal)

Serious problems with weak passwords and PSK! Can use Radius / EAP / LEAP authentication

Leap is vulnerable to known attacks (asleap) Uses stronger encryption and initialization vectors TKIP avoids IV codebook attacks Support is mandatory for Wi-Fi logo

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

802.11i / WPA2

Security standard applicable to 802.11 family Application of 802.1X to 802.11 protocols Ratified by IEEE in mid 2004 WiFi alliance brands 802.11i as WPA2 Requires AES layer 2 encryption Fully encrypted WLAN Not all legacy cards can be supported Support for Windows XP/SP2 and Linux available

Linux / *NIX – wpa_supplicant Generic 802.1X on Linux support - XSupplicant

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Virtual Private Networks

Virtual Private Networks (VPNs) can provide secure connections on insecure networks IPSec PPTP L2TP

VPNs should be used in open environments for secure access to private resources

VPNs do not protect from threats or viruses on the open network

VPNs should be used with personal firewalls

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Securing Wireless Networks

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Securing your network

Define your wireless policy in writing and enforce Don't use default settings! Change the SSID Disable SSID broadcast, if so desired Use WPA if possible (802.11i/WPA2 where available) Use WEP where WPA is not available Watch for rogue access points and eliminate Disable wireless where not used Disallow open connections Treat wireless networks as untrusted networks Keep access points and systems up to date! Employ a security tool such as ISS Proventia Desktop

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Physical Access

Plan for physical (RF) access controls Reduce power to reduce leakage Use more access points for better defined coverage Plan antenna locations

Avoid outer walls Provide for shielding of sensitive areas Provide spot coverage for weak areas Test for RF leakage and coverage Physical controls help, but are not the total answer!

They can get better antennas They can boost more power

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Encryption and authentication

What level(s) are necessary and/or sufficient? What is being protected?

Confidentiality? Access?

Link level WEP/WPA/WPA2

VPN Application Multiple layers may be necessary

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Security on Open Networks

Use a secure VPN to access private resources Use SSL encrypted versions of access protocols

https instead of http pop3s instead of pop3 imaps instead of imap

Use a personal firewall or similar protection Use an intrusion protection system (IPS)

ISS Proventia Desktop Scan for viruses Keep systems religiously up to date

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Securing WEP

Use WEP only if nothing else better is available Use 128 bit encryption Test all access points for weak packets (Kismet) Consider changing shared access keys periodically or

when security situation changes Use with MAC controls on small networks Keep access points behind a firewall in a DMZ Assume the network is untrusted and provide for

additional security

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Securing WPA/WPA2

Use WPA2 or WPA when ever available Use hardened authentication where possible

Radius EAP

Use strong passwords for WPA Pre-Shared Keys Minimum of 17 characters Include complex characters (numbers, caps, punctuation) It's easier to break weak passwords on WPA PSK than it is

to do codebook attacks on WEP! Avoid LEAP

Known attacks Online attack tool: asleap

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Who Forgot to Invite the Cryptographers?

Hardened crypto may not provide hardened security Flaws in algorithms Flaws in design Flaws in implementation

WEP used RC4 – 128 bit cryptography Lots of design and implementation errors

WPA was suppose to address flaws in WEP Still some serious problems in WPA-PSK

SSL servers on APs may be using shared certificates Static shared certificates are worse than shared keys People can download firmware with certificates to your AP Dynamic, self-signed, certificates are better than shared certs

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Deception Tools

Fake access points can befuddle war drivers Deception tools can detect intruders looking for access Access attempts to honeypot access points can trigger

alerts that intruders may be in the area Fake access points do no good if they are not monitored

and maintained! Generally not a worth-while investment unless you are

protecting a high profile target

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Closing

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Summary

Wireless networking is inherently insecure Default configurations are insecure (but getting better) Wireless takes effort and direction to secure Wireless networks can be made secure Insecure networks can be used securely Simply throwing cryptography at it may not be the answer! You may need additional security tools on the workstation Be paranoid – They are out there and they are out to get you!

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Tools

DD-WRT <http://www.dd-wrt.com> Linksys Info <http://www.linksysinfo.org> Kismet <http://www.kismetwireless.net> Airsnort <http://airsnort.shmoo.com> BSD-Airtools <http://www.dachb0den.com> THC-Wardrive <http://www.thc.org> Netstumbler <http://stumbler.net> AiroPeek <http://www.ig.com.au/AiroPeekMain.htm

> Airmagnet <http://www.airmagnet.com> FakeAP <

http://www.blackalchemy.to/project/fakeap> Wardriving CD <http://www.wardrive.net/wardriving/tools

> Proventia Desktop <http://www.iss.net>

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

Resources and References

http://www.wittsend.com/mhw/2006/Wireless-Security-ALE http://www.informationheadquarters.com/Internet/WIFI.sht

ml http://www.networkintrusion.co.uk/wireless.htm http://www.usbwifi.orcon.net.nz/ http://www.wi-fi.org/ http://www.wifinetnews.com/ http://www.wi-fiplanet.com/ http://grouper.ieee.org/groups/802/11/ http://www.drizzle.com/~aboba/IEEE/

© 2006 Internet Security Systems. All rights reserved worldwide. Contents are property of Internet Security Systems.

www.iss.net

Wireless Security

Michael H. [email protected]@WittsEnd.com

August 10, 2006


Recommended