Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page69/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   63   64   65   66   67   68   69   70   71
FULLTEXT01
ijsrp-p4303
2. Investigate rogue devices
The next step is to use spectrum analyzers to locate non sources of interference
(e.g., microwave ovens, Bluetooth, cordless phones. For 802.11 devices, an existing inventory should be used to isolate unknown devices for further investigation. Search for activities in the bands and channels not in use helps to catch devices trying to escape detection.
3. Testing access points
The following questions are to guide you in testing your APs: o Is the AP running the latest firmware and security patches o Is it still having the factory default ESSID? o Has the default administrative login/password been changed o Can the administrative password be easily cracked o Are stronger authentication options available (e.g., private keys o Are there any unnecessary open ports (e.g., telnet, http, snmp, tftp)? o Are those open ports vulnerable to known exploits o Are there available encrypted administrative interfaces (e.g., ssh, https)? o Have security alerts or logs been turned on (e.g., syslog, traps

Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude Arinze Sunday
- 52 - o Have filters been used to prevent unauthorized protocols (e.g., ARP, RIP, SNMP,
NetBIOS) from passing through the AP into the wired network o Are filters available/used to block user-to-user wireless o Is the right ESSID and channel in use by the AP o Are AP’s security parameters consistent with defined policy o How long does it take to crack the key if WEP is in use o Is the AP emitting any known weak initialization vectors (IVs o Is the AP’s PreShared Key (PSK) is easily crackable, if it is in use o If the AP is not using WPA2, are WPA2 upgrades available o Can the AP withstand simulated 802.11 DoS attacks (e.g., Authenticate floods

Download 470.11 Kb.

Share with your friends:
1   ...   63   64   65   66   67   68   69   70   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page