Ch9 - 9.02 - Securing a Wireless Network Flashcards
Captive Portal
A common technique used by wireless hotspots is to configure a captive
portal, which forces a person to authenticate to the network via a web page
before Internet access is allowed. An organization can use a captive portal to
intercept all traffic destined for the Internet. Before allowing the traffic to
pass through the router, the user must either log on or at least accept the terms
of use. Implementing a captive portal is a great idea when you want to allow
visitors to your facility to have Internet access.
Securing a wireless network:
+ Set a password for the admin account.
+ Change the SSID.
+ Disable SSID broadcasting.
+ Use MAC filtering.
+ Configure encryption with WPA2.
+ Place the access point in the center of the building.
+ Lower the power levels to control how far a wireless signal can travel.
+ Use a VPN solution for high-security environments.
Data emanation
Electronic components always release emissions,
and someone could collect emissions from electrical components and
piece them together into readable data
Jamming/interference
As mentioned earlier, you could experience
interference on the wireless network from components such as cordless
phones. This is a security issue because interference can make the
wireless network go down, a violation of availability
Packet sniffing
Anyone with a wireless network card and a sniffer
can easily capture wireless data. Be sure to encrypt all wireless
communication to protect confidential data
War driving
War-driving is when someone drives around with a laptop and tries to locate
wireless networks that they can connect to
War chalking
War-chalking. In war chalking, when someone discovers a wireless network, they
chalk a symbol outside the building notifying the rest of the war-driving
community that a wireless network is inside. With war chalking, different
symbols represent the configuration of the wireless network that was
discovered.
)(: Open Wireless Network
(): Closed Wireless Network
(W): WEP-enabled Network
Evil Twin - Rogue Access Point
A hacker can install a rogue access point from their wireless connection on
a laptop and make the laptop device appear to be a valid access point. This is
known as an evil twin, with the benefit to the hacker being that clients will
connect to the hacker’s fake access point, thinking it is a valid wireless
network. All data sent on this wireless network will be sent to the hacker’s
laptop, where they can capture and read the data.