Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page68/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   63   64   65   66   67   68   69   70   71
FULLTEXT01
ijsrp-p4303
APPENDIX

Wi-Fi VULNERABILITY ASSESSMENT CHECKLIST

1. Nearby wireless devices discovery
The first step in any vulnerability assessment is identification of all wireless devices near the sites) under test. Document the following o Channels with active traffic in the 2.4 GHz band. o Channels with active traffic in the 5 GHz band. o Sources of noninterference in these frequency bands. o Document for each discovered 802.11 access point
• Media Access Control (MAC) address
• Extended service set identifier (ESSID)
Channel
• Average/Peak signal-to-noise ratio (SNR)
• Beaconed security parameters (i.e., WEP, TKIP or AES-CCMP)
• Approximate location and probable owner o Document for each discovered 802.11 station
MAC address
• Associated ESSIDs
• Associated AP(s) or peer stations)
• Average/Peak SNR
If visible, X identity
• Approximate location and probable owner

Download 470.11 Kb.

Share with your friends:
1   ...   63   64   65   66   67   68   69   70   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page