Skip to main content

Home/ qmubtqgmlsupwiovaoad/ Wireless Access Point 20 Second Hack
Roland Saunders

Wireless Access Point 20 Second Hack - 0 views

Router Homeplug XP Point wireless access antenna networking

started by Roland Saunders on 12 Mar 12
  • Roland Saunders
     
    Wireless access points may be hacked in 20 seconds or less once they are mounted in the wrong place. The most secure wireless network may be the one nobody knows about.
    .
    A rogue access issue (AP) is actually any Wi-Fi access point connected to a network without authorization. In order to defend sensitive data, it is critical to prevent the utilization of unauthorized access points. Since a rogue AP is not under the management associated with network administrators, nor will it necessarily conform to network security policies, then rogue access points allows attackers to bypass multi-level security and attack the network or capture delicate data.

    In the absence of a cellular probe to monitor your airwaves, security personnel can manually find rogue APs. An inexpensive but effective way for finding potential rogues is to use a freely available Transmission Control Protocol (TCP) dock scanner that identifies endowed TCP ports from various devices attached to the network.

    The steps to discover a rogue AP begin using running the port scanner software with a computer connected to that network. The utility uncovers just about all Port 80 (HTTP) interfaces on the network, which include all Web servers, some machines, and nearly all connection points. The AP will generally answer the port scanner's ping with the vendor name and it's corresponding Internet Protocol (IP) home address.

    Once a great AP is discovered, the network administrator must determine if the AP is or is not really a rogue. Ideally, the administrator would use software that will allow a pre-configured authorized listing of access APs. If this scanning for rogue APs is manual, a list of authorized APs is still necessary. The authorized list can be populated using the next attributes:

    • MACINTOSH Address

    • SSID

    • Merchant

    • Radio Media Type

    • Channel
    The aforementioned attributes, determined automatically or manually if software is not really being used, will alert the detection tool if access points with differing attributes from the authorized list are present.

    When fake access points are figured out, the administrator must have procedures in position to identify their locations.

    Perhaps probably the most difficult step in the following discovery process is to determine the physical location of that rogue access point. Router table entries could help. A routing table is present on all IP nodes.

    The routing table stores information regarding IP networks and how they may be reached. Because all nodes perform a version of a IP routing then any sort of node loading the TCP/IP protocol contains a routing table. When an IP packet is to be forwarded, the routing table is used to determine the physical or logical interface useful to forward the packet to help either its destination or the following router.

    Along with the information derived from your routing table, a rogue IP address may be located by determining which often node the address utilizes. Keep in mind that this location of nodes must be correlated with the addresses in the routing table. The limited operational distance in the RF signal can be handy in narrowing down the physical location in the rogue access point too.

    Perhaps probably the most fundamental step in avoiding a rogue access point may very well be having a security insurance plan. Router

To Top

Start a New Topic » « Back to the qmubtqgmlsupwiovaoad group