Problem solve Get help with specific problems with your technologies, process and projects.

Penetration testing -- Securing wireless access points

Learn how to deal with war walking and driving, common wireless access point vulnerabilities and countermeasures, and wireless testing tools in this installment of the Vines penetration testing series.

This is the fifth installment of our six-part penetration testing tutorial for consultants and value-added resellers...

(VARs). In this part we'll look at war walking and driving, common wireless access point vulnerabilities and countermeasures, and wireless testing tools.

As wireless networks proliferate throughout the enterprise, any company providing thorough vulnerability and penetration assessment services must be able to provide a full menu of wireless testing tools and methodology.

The rapid popularity of wireless networking technologies has introduced a host of new security issues. This popularity is being driven by two major factors: ease of implementation and cost. The convenience of constant access to networks and data, regardless of location, is very reasonably priced for most companies

The most common WLAN standards, as defined by the IEEE's 802.11 working group, are 802.11b and 802.11g, with 802.11a still circulating. Newer standards include 802.11n and 802.11e. Most hardware today is b/g compatible.

Penetration testing -- Securing wireless access points

  War walking and war driving
  WLAN vulnerabilities, SSID issues, WEP weakness
  WLAN DoS attacks, MAC address vulnerabilities
  Wireless testing tools
  WLAN security countermeasures

About the author
Russell Dean Vines is a bestselling author, Chief Security Advisor for Gotham Technology Group, LLC, and former President of the RDV Group. His most recent book is
The CISSP and CAP Prep Guide, published by John S. Wiley and Sons.

This was last published in July 2007

Dig Deeper on Best practices for cybersecurity management

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.