RE: Wireless Pent-Test

From: Matthew Wagenknecht (Matthew.Wagenknecht@quantum.com)
Date: Mon Oct 06 2003 - 11:08:10 EDT


Linksys released new firmware for their WAP54G, an 802.11G/B wireless access
point and WRT54G, an 802.11G/B router/wireless access point. The firmware
supports WPA and either TKIP - for dynamic keys with weaker encryption - or
AES encryption - for static keys but stronger encryption. Your users won't
have to change their WEP keys regularly. Even if they do, it would only take
about an hour after they changed the key to figure it out.

Avoid WEP altogether..

If you MUST go with WEP, get an OriNoco card and Kismet, a linux-based
Wireless audit tool. It's not a real easy set up if you are not familiar
with Linux. If you don't have a box with Linux on it, get Knoppix-std
(http://www.knoppix-std.org). It is a bootable CD that runs Linux directly
from the CD. It won't even touch your hard drive (unless you tell it too).
It has lots of wireless audit tools ready to run along with the patched
OriNoco drivers.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Matt Wagenknecht CISSP | MCSE
Security Administrator
 :::: echo oraios i syzygos kai polloi paidia ::::
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
 
Never be afraid to try something new.
Remember, amateurs built the ark; professionals built the Titanic.

This email may contain confidential and privileged information for the sole
use of the intended recipient. Any review or distribution by others is
strictly prohibited. If you are not the intended recipient, please contact
the sender and delete all copies of this email message.

-----Original Message-----
From: Cesar Diaz [mailto:cesadiz@yahoo.com]
Sent: Saturday, October 04, 2003 7:16 PM
To: pen-test@securityfocus.com
Subject: Wireless Pent-Test

Remote users in my company have been begging for permission to use wireless
NICs in their laptops for awhile now. When they are not on the road, most
of them work from home and would like to be able to use their laptops
anywhere in their house.

Due to our industry and business requierements, we have to document every
process and method used to access our data and prove that we've tested the
security of our data.In order to let the users go wireless I have to show
that I've tested the security on a wireless network.

  Our idea is to let the users buy wireless routers to connect to their
cable/dsl routers and then wireless PCMCIA or USB cards on the laptop. We
would implement 128 bit WEP security to prevent unauthorized access. I
realize that WEP does not provide for stringent security, but we feel that
by forcing users to change their WEP key regularly we can meet our
requierements.

My question is, how do I test WEP and document wether or not it's secure?
Any way to sniff for WEP keys, or to brute force attack a WEP session? If
there is, how hard is it to set up? How much of a risk of a wireless
connection with WEP enabled to be comprimised other than a dedicated, brute
force attack?

Any information is greatly appreciated.

Cesar

---------------------------------------------------------------------------
Tired of constantly searching the web for the latest exploits? Tired of
using 300 different tools to do one job? Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2
----------------------------------------------------------------------------

---------------------------------------------------------------------------
Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.
www.coresecurity.com/promos/sf_ept2
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:41 EDT