Re: Wireless Audit Reports

From: Maudite MLRL (maudite.mlrl@gmail.com)
Date: Sat Apr 01 2006 - 14:54:22 EST


Nomad Mobile Research Centre has some fun papers about exploiting
wireless notebooks that don't have an AP nearby if you would like to
see some examples. The schmoo con paper was interestingly fun.

http://www.nmrc.org/
http://www.nmrc.org/pub/present/shmoocon-2006-sn.ppt
http://www.nmrc.org/pub/advise/20060114.txt

- M

On 3/31/06, Shenk, Jerry A <jshenk@decommunications.com> wrote:
> Something else right along this train of thought - client configuration.
>
> If the client is configured to connect to any AP, then you have no idea
> where your laptops are connecting to. I have a client in a major
> metropolitan area. Walking around in their office, there are about 40
> wireless networks. One of the people from another office recently
> commented how handy it was that they installed wireless.....ah, they
> hadn't. That means she was connecting to an AP in some other office.
>
> -----Original Message-----
> From: steven@lovebug.org [mailto:steven@lovebug.org]
> Sent: Thursday, March 30, 2006 10:24 PM
> To: Matthew Webster
> Cc: pen-test@securityfocus.com
> Subject: Re: Wireless Audit Reports
>
> Hello,
>
> I have been reading all of these replies and would just like to throw in
> a
> little bit more. Someone mentioned that a person could setup another AP
> to
> lure in people from your network. This is definitely a potential risk
> as
> they can do this in a few ways. They could just stand up their AP with
> their own SSID and hope for someone else to connect and attempt to
> compromise their machine, sniff traffic, and/or conduct MITM attacks.
> They could also do the same thing by cloning the name of your network's
> SSID. I am not sure how many APs your environment has, but it might be
> worth documenting all of the instances of the valid SSID and the
> associated MAC addresses. If you are going by SSID alone it is possible
> that there is a fake AP they showed up and it could be overlooked.
> Documenting the MAC addresses, channel, location, IP address, etc of
> your
> APs and looking for any anomalies might be good too. If you are going
> to
> be doing consistent reports you can always refer to your previously
> collected information.
>
> Also, as I am sure you have know and has been referenced in another post
> -- your report is only as accurate as the time period for which your
> audit
> was conducted. Ad-hoc networks, rogue APs can be plugged in an
> unplugged
> at any moment. Unless you have something like AirDefense or a WLSE --
> you
> need to frequently check to be sure you are consistently free of these
> things. Ad-hoc (peer-to-peer) networks are frequently overlooked and
> area
> decent risk, especially if your machines aren't fully patched. If you
> want to have a full and comprehensive report, make sure you are looking
> at
> 802.11a/b/g.
>
> Anyway -- I hope that helps. Btw.. what "tools" are you using now?
>
> Steven
> > Hi,
> >
> > I work in an environment that has a policy that does not permit
> > wireless devices. We still do an "audit" of the area to ensure that
> > there are no wireless devices in our area. I wish to prove that there
> > are no devices. Being in a city, there are literally hundreds of
> > wireless networks present - perhaps up to 50 in any one given area of
> > our building. I have tracked the signals down and have determined
> that
> > there are no rogue access points or peer networks hidden in our
> portion
> > of the building.
> >
> > Now a traditional wireless audit would be easy. I could report
> > the signal strengths of our devices, if the SSID's are correct, are
> > non-broadcast, etc. That would be an easy report to create after data
> > collection. In this case, I am trying to prove a negative. I can
> list
> > networks, signal strengths, etc. but I feel like I am fluffing the
> > report with meaningless and time wasting statistics. Does anyone have
> > any experience in what they would report under these circumstances?
> >
> > Matt
> >
> >
> ------------------------------------------------------------------------
> ------
> > This List Sponsored by: Cenzic
> >
> > Concerned about Web Application Security?
> > As attacks through web applications continue to rise, you need to
> > proactively
> > protect your applications from hackers. Cenzic has the most
> comprehensive
> > solutions to meet your application security penetration testing and
> > vulnerability management needs. You have an option to go with a
> managed
> > service (Cenzic ClickToSecure) or an enterprise software (Cenzic
> > Hailstorm).
> > Download FREE whitepaper on how a managed service can help you:
> > http://www.cenzic.com/forms/ec.php?pubid=10025
> > And, now for a limited time we can do a FREE audit for you to confirm
> your
> > results from other product. Contact us at request@cenzic.com
> >
> ------------------------------------------------------------------------
> ------
> >
> >
>
>
>
> ------------------------------------------------------------------------
> ------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> As attacks through web applications continue to rise, you need to
> proactively
> protect your applications from hackers. Cenzic has the most
> comprehensive
> solutions to meet your application security penetration testing and
> vulnerability management needs. You have an option to go with a managed
> service (Cenzic ClickToSecure) or an enterprise software (Cenzic
> Hailstorm).
> Download FREE whitepaper on how a managed service can help you:
> http://www.cenzic.com/forms/ec.php?pubid=10025
> And, now for a limited time we can do a FREE audit for you to confirm
> your
> results from other product. Contact us at request@cenzic.com
> ------------------------------------------------------------------------
> ------
>
>
>
>
>
>
> **DISCLAIMER
> This e-mail message and any files transmitted with it are intended for the use of the individual or entity to which they are addressed and may contain information that is privileged, proprietary and confidential. If you are not the intended recipient, you may not use, copy or disclose to anyone the message or any information contained in the message. If you have received this communication in error, please notify the sender and delete this e-mail message. The contents do not represent the opinion of D&E except to the extent that it relates to their official business.
>
>
> ------------------------------------------------------------------------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> As attacks through web applications continue to rise, you need to proactively
> protect your applications from hackers. Cenzic has the most comprehensive
> solutions to meet your application security penetration testing and
> vulnerability management needs. You have an option to go with a managed
> service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
> Download FREE whitepaper on how a managed service can help you:
> http://www.cenzic.com/forms/ec.php?pubid=10025
> And, now for a limited time we can do a FREE audit for you to confirm your
> results from other product. Contact us at request@cenzic.com
> ------------------------------------------------------------------------------
>
>

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:47 EDT