Đính kèm là một case study thiết kế một Wireless LAN. Người viết có dùng một số shareware tool trong quá trình khảo sát thiết kế. Mô hình là công ty bảo hiểm NY.
INTRODUCTION...................................... .................................................. ...................... 3
DISCLAIMER........................................ .................................................. .......................... 3
WIRELESS ENUMERATION TOOL.............................................. ................................ 3
HOW IS THIS POSSIBLE?......................................... .................................................. ... 5
ACCESS POINT ASSOCIATION AND AUTHENTICATION EXPLOITS.................. 9
WEP EXPLOITS.......................................... .................................................. .................. 11
AN EXAMPLE RELATIVE TO NYI............................................... ............................... 14
OTHER TYPES OF ATTACKS .................................................. .................................... 16
JAMMING .................................................. .................................................. ................... 16
MAN-IN-THE-MIDDLE ATTACKS........................................... .......................................... 16
MAC ADDRESS SPOOFING.......................................... .................................................. .. 16
RECOMMENDATIONS .................................................. ............................................... 17
ROTATING WEP STATIC KEYS .................................................. ..................................... 17
CENTRALIZED ENCRYPTION KEY SERVERS........................................... ......................... 17
ADVANCED ENCRYPTION STANDARD OR WEPV2 AND 802.11I ..................................... 18
TEMPORAL KEY INTEGRITY PROTOCOL (**IP) .................................................. ........... 18
FILTERING TECHNIQUES .................................................. ............................................... 19
WIRELESS VPN............................................... .................................................. ............. 21
TURNING OFF DHCP FOR WIRELESS DEVICES .................................................. .............. 21
WIRELESS GATEWAYS.......................................... .................................................. ........ 22
THE USE OF A SEPARATE WIRELESS DMZ............................................... ....................... 23
LOST OR STOLEN WIRELESS DEVICES .................................................. ........................... 23
PHYSICAL SECURITY .................................................. ................................................ 23
RADIO FREQUENCY/CELL SIZE MANAGEMENT .................................................. .............. 23
ACCESS POINT AUDITS .................................................. ................................................ 24
CORPORATE SECURITY POLICY............................................ ................................... 25
WIRELESS INTRUSIONS DETECTION TOOLS .................................................. ..... 25
SUMMARY........................................... .................................................. .......................... 30
INTRODUCTION...................................... .................................................. ...................... 3
DISCLAIMER........................................ .................................................. .......................... 3
WIRELESS ENUMERATION TOOL.............................................. ................................ 3
HOW IS THIS POSSIBLE?......................................... .................................................. ... 5
ACCESS POINT ASSOCIATION AND AUTHENTICATION EXPLOITS.................. 9
WEP EXPLOITS.......................................... .................................................. .................. 11
AN EXAMPLE RELATIVE TO NYI............................................... ............................... 14
OTHER TYPES OF ATTACKS .................................................. .................................... 16
JAMMING .................................................. .................................................. ................... 16
MAN-IN-THE-MIDDLE ATTACKS........................................... .......................................... 16
MAC ADDRESS SPOOFING.......................................... .................................................. .. 16
RECOMMENDATIONS .................................................. ............................................... 17
ROTATING WEP STATIC KEYS .................................................. ..................................... 17
CENTRALIZED ENCRYPTION KEY SERVERS........................................... ......................... 17
ADVANCED ENCRYPTION STANDARD OR WEPV2 AND 802.11I ..................................... 18
TEMPORAL KEY INTEGRITY PROTOCOL (**IP) .................................................. ........... 18
FILTERING TECHNIQUES .................................................. ............................................... 19
WIRELESS VPN............................................... .................................................. ............. 21
TURNING OFF DHCP FOR WIRELESS DEVICES .................................................. .............. 21
WIRELESS GATEWAYS.......................................... .................................................. ........ 22
THE USE OF A SEPARATE WIRELESS DMZ............................................... ....................... 23
LOST OR STOLEN WIRELESS DEVICES .................................................. ........................... 23
PHYSICAL SECURITY .................................................. ................................................ 23
RADIO FREQUENCY/CELL SIZE MANAGEMENT .................................................. .............. 23
ACCESS POINT AUDITS .................................................. ................................................ 24
CORPORATE SECURITY POLICY............................................ ................................... 25
WIRELESS INTRUSIONS DETECTION TOOLS .................................................. ..... 25
SUMMARY........................................... .................................................. .......................... 30
Comment