9.5 Exploitable WLAN Configurations


9.5 Exploitable WLAN Configurations

It is important that network administrators learn to properly configure administrative passwords, encryption settings, automatic network connection functions, reset functions, Ethernet Medium Access Control (MAC) Access Control Lists (ACLs), shared keys, and Simple Network Management Protocol (SNMP) agents . Doing so will help eliminate many of the vulnerabilities inherent in a vendor's out-of-the-box default configuration settings. Network administrators should configure APs in accordance with established security policies and requirements. A description of each of the vulnerabilities that can result from one of these configuration problems was presented in Chapter 8. The following list will refresh your memory:

  • Default passwords not updated

  • WLAN encryption not set for the strongest encryption available

  • No controls over the reset function

  • MAC ACL functionality not in use

  • Not changing the SSID from its factory default

  • Not changing default cryptographic keys

  • Not changing the default SNMP parameter

  • Not changing the default channel

  • Not using DHCP

Now, let's look at how intruders use these WLAN weaknesses to exploit an organization.




Wireless Operational Security
Wireless Operational Security
ISBN: 1555583172
EAN: 2147483647
Year: 2004
Pages: 153

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net