CEH_ Official Certified Ethical Hacker Review Guide_ Exam 312-50 - Kimberly Graves [76]
802.11i and WPA2 use the same encryption and authentication mechanisms as WPA2. However, WPA2 doesn't require vendors to implement preauthorization. Preauthorization enables fast, secure roaming, which is necessary in very mobile environments with timesensitive applications such as wireless voice over IP.
Table 10.1 summarizes the authentication and encryption options for WLANs.
Hacking Tools
Aircrack is a WEP-cracking software tool. It doesn't capture packets; it's used to perform the cracking after another tool has captured the encrypted packets. Aircrack runs on Windows or Linux.
WEPCrack and AirSnort are Linux-based WEP-cracking tools.
NetStumbler and Kismet are WLAN discovery tools. They both discover the Media Access Control (MAC) address, Service Set Identifier (SSID), security mode, and channel of the WLAN. Additionally, Kismet can discover WLANs whose SSIDs are hidden, collect packets, and provide IDS functionality.
Overview of Wireless Sniffers and
Locating SSIDs, MAC Spoofing
A common attack on a WLAN involves eavesdropping or sniffing. This is an easy attack to perform and usually occurs at hotspots or with any default installation access point (AP), because packets are generally sent unencrypted across the WLAN. Passwords for network access protocols such as FTP, POP3, and SMTP can be captured in clear text, meaning unencrypted, by a hacker on an unencrypted WLAN.
The SSID is the name of the WLAN and can be located in a beacon. If two wireless networks are physically close, the SSIDs are used to identify and differentiate the respective networks. The SSID is usually sent in the clear in a beacon packet. Most APs allow the WLAN administrator to hide the SSID. However, this isn't a robust security mechanism because some tools can read the SSID from other packets such as probe and data packets.
An early security solution in WLAN technology used MAC address filters: A network administrator entered a list of valid MAC addresses for the systems allowed to associate with the AP. MAC filters are cumbersome to configure and aren't scaleable for an enterprise network because they must be configured on each AP. MAC spoofing is easy to perform and negates the effort required to implement MAC filters. A hacker can identify a valid MAC address because the MAC headers are never encrypted.
Hacking Tool
SMAC is a MAC spoofing tool that a hacker can use to spoof a valid user's address and gain access to the network.
Understand Rogue Access Points
Rogue access points are WLAN access points that aren't authorized to connect to a target network. Rogue APs open a wireless hole into the network. A hacker can plant a rogue AP, or an employee may unknowingly create a security hole by plugging an access point into the network so the user can be mobile. Any rogue AP can be used by anyone who can connect to the AP, including a hacker, giving them access to the wired LAN. This is why it's critical for organizations that have a no wireless policy to perform wireless scanning to ensure no rogue APs are connected to the network.