Penetration testing -- Securing wireless access points

Learn how to deal with war walking and driving, common wireless access point vulnerabilities and countermeasures, and wireless testing tools in this installment of the Vines penetration testing series.

This is the fifth installment of our six-part penetration testing tutorial for consultants and value-added resellers (VARs). In this part we'll look at war walking and driving, common wireless access point vulnerabilities and countermeasures, and wireless testing tools.

As wireless networks proliferate throughout the enterprise, any company providing thorough vulnerability and penetration assessment services must be able to provide a full menu of wireless testing tools and methodology.

The rapid popularity of wireless networking technologies has introduced a host of new security issues. This popularity is being driven by two major factors: ease of implementation and cost. The convenience of constant access to networks and data, regardless of location, is very reasonably priced for most companies

The most common WLAN standards, as defined by the IEEE's 802.11 working group, are 802.11b and 802.11g, with 802.11a still circulating. Newer standards include 802.11n and 802.11e. Most hardware today is b/g compatible.


Penetration testing -- Securing wireless access points

 Introduction
  War walking and war driving
  WLAN vulnerabilities, SSID issues, WEP weakness
  WLAN DoS attacks, MAC address vulnerabilities
  Wireless testing tools
  WLAN security countermeasures

About the author
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is
The CISSP and CAP Prep Guide, published by John S. Wiley and Sons.


This was first published in July 2007

Dig deeper on Threat management and prevention

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

MicroscopeUK

SearchCloudProvider

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchConsumerization

SearchDataManagement

SearchBusinessAnalytics

Close