Page 803 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 803

WEP is the original encryption option of 802.11 wireless networking.
               It’s based on RC4. However, because of mistakes in its design and

               implementation, WEP’s primary flaw is related to its IV. The WEP IV
               is only 24 bits long and is transmitted in plaintext. This, coupled with
               the fact that WEP doesn’t check for packet freshness, allows a live
               WEP crack to be successful in less than 60 seconds (see the Wesside-
               ng tool from the Aircrack-ng suite at www.aircrack-ng.org).


               Rogue Access Points

               A security concern commonly discovered during a site survey is the

               presence of rogue wireless access points. A rogue WAP may be
               planted by an employee for convenience, or it may be operated
               externally by an attacker.

               A wireless access point planted by an employee can be connected to
               any open network port. Such unauthorized access points usually aren’t
               configured for security or, if they are, aren’t configured properly or in
               line with the organization’s approved access points. Rogue wireless

               access points should be discovered and removed in order to eliminate
               an unregulated access path into your otherwise secured network.

               It’s common for an attacker to find a way to visit a company (via a
               friend who is an employee or by going on a company tour, posing as a
               repair technician or breakfast taco seller, or even breaking in at night)
               in order to plant a rogue access point. After a rogue access point is
               positioned, an attacker can gain entry to the network easily from a

               modest distance away from your front door.

               A rogue WAP can also be deployed by an attacker externally to target
               your existing wireless clients or future visiting wireless clients. An
               attack against existing wireless clients requires that the rogue WAP be
               configured to duplicate the SSID, MAC address, and wireless channel
               of the valid WAP, although operating at a higher power rating. This
               may cause clients with saved wireless profiles to inadvertently select or

               prefer to connect to the rogue WAP instead of the valid original WAP.

               The second method focuses on attracting new visiting wireless clients.
               This type of rogue WAP is configured with a social engineering trick by
               setting the SSID to an alternate name that appears legitimate or even
   798   799   800   801   802   803   804   805   806   807   808