[Wireless Attacks]
Believe it or not, wireless penetration testing is not a one trick pony. There are several ways to compromise a network and we have discussed a few below.
Wireless Access Control Attacks: Wireless Access Control Attacks aims to penetrate a network by evading WLAN access control measures such as AP MAC filters and Wi-Fi port access controls.
Wireless integrity Attacks: In integrity attacks, the attackers send forged control, data and management frames over the wireless network to misdirect the wireless devices in order to perform DOS attack.
[Steps for Wireless Assessment]
Wireless Security Assessment Methodologies, be it Manual or Automated, involves 5 steps
The first is the discovery of APs, identification of targets to be made a part of the assessment and triggering the traffic leaked outside the set boundaries.
The second step deals with inspecting access control, identifying vulnerabilities already on board and determining security settings.
The third involves investigation of additional encryption architecture.
The fourth step basically is enabling user, device and manual authentication and the final one, assessing the physical location of APs.
The final and primary goal of Wireless Security Assessment is to monitor networks and alert personnel of any unchartered irregularities in its traffic, whichever type of assessment one chooses to adopt.
[Best Practices for Wireless networks ]
Following Best Practices as per industry standards can help secure our Wireless networks:
1.Change the default SSID after WLAN configuration
2.Set the router access password and enable firewall protection
3.Enable MAC address filtering on the AP or router
4.Enable encryption on router and change passphrase often
5.Use SSID cloaking to keep certain default wireless messages from broadcasting ID to everyone
6.Place a firewall or packet filter in between the AP and the corporate internet
7.Check the wireless devices for configuration or setup problems regularly
8.Implement a different technique for encrypting the traffic, such as IPSEC over wireless
9.Implement WPA2 Enterprise wherever possible
10.Place wireless access points in a secure location
11.Keep drivers on all wireless devices updated
12Use a centralized server for authentication