This is the fifth installment of our six-part penetration testing tutorial for consultants and value-added resellers...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
(VARs). In this part we'll look at war walking and driving, common wireless access point vulnerabilities and countermeasures, and wireless testing tools.
As wireless networks proliferate throughout the enterprise, any company providing thorough vulnerability and penetration assessment services must be able to provide a full menu of wireless testing tools and methodology.
The rapid popularity of wireless networking technologies has introduced a host of new security issues. This popularity is being driven by two major factors: ease of implementation and cost. The convenience of constant access to networks and data, regardless of location, is very reasonably priced for most companies
The most common WLAN standards, as defined by the IEEE's 802.11 working group, are 802.11b and 802.11g, with 802.11a still circulating. Newer standards include 802.11n and 802.11e. Most hardware today is b/g compatible.
Penetration testing -- Securing wireless access points
War walking and war driving
WLAN vulnerabilities, SSID issues, WEP weakness
WLAN DoS attacks, MAC address vulnerabilities
Wireless testing tools
WLAN security countermeasures
About the author
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is The CISSP and CAP Prep Guide, published by John S. Wiley and Sons.