Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Hacking Wireless Networks For Dummies

.pdf
Скачиваний:
224
Добавлен:
15.03.2015
Размер:
11.5 Mб
Скачать

300 Part III: Advanced Wi-Fi Hacks

Part IV

The Part of Tens

In this part . . .

We made it — and we’re so glad you’ve joined us! We’re at the end of the ethical wireless-hacking

road — if there truly is a such a thing. In this part, we put together some great wireless hacking resources that you can benefit from in the road ahead. We not only recap our favorite wireless-hacking tools, but we also talk about

common wireless-hacking mistakes you can avoid. We also outline critical steps you need to perform after you’ve finished your wireless-security tests. Keep this part handy — this is some of the most important material of the entire book.

Chapter 16

Ten Essential Tools for Hacking Wireless Networks

In This Chapter

Turning on and moving out (with the right laptop computer)

Hooking up (with a good network card)

Tuning in (with a high-gain antenna)

Getting found (via the GPS system)

Going wireless (with various software tools)

Looking around (with Google)

Looking up the rest (with a first-rate wireless reference guide we happen to know)

As with any trade, it’s essential to have the right tools when testing your wireless network for security vulnerabilities. Here are ten tools we have

found that get the job done.

Laptop Computer

For starters, you’ve got to a have a good test system — preferably a portable laptop computer. Although it is possible to perform wireless-security testing using a handheld device such as a Pocket PC, the tools available on such devices are limited compared to those on a laptop system.

Due to the multiple operating system requirements of the popular wireless testing tools, we recommend using either a system that can dual boot Windows (preferably 2000 or XP) and Linux (any recent distribution will do) or a Windows-based system running a virtual machine program (such as VMware) on which you can install multiple operating systems. The hardware requirements for systems running a single operating system are pretty minimal given today’s standards. A system with a Pentium III or equivalent processor, 256MB RAM, and at least a 30–40GB hard drive should be more than enough. If you’ll be running VMware or another virtual machine program, you’ll want to at least double this amount of RAM and hard drive space.

304 Part IV: The Part of Tens

Wireless Network Card

In addition to the laptop, you’ve got to have a good wireless network-inter- face card (NIC). Look for a PC Card NIC that’s not only compatible with the various wireless tools, but one that also has a connector for an external antenna so you can pick up more signals. The Orinoco Gold card (and its re-badged equivalents) serves both purposes very well. Many wireless NICs built in to today’s laptops are good general purpose cards, but your test results may be limited due to the shorter radio range capability of the internal antennas.

Antennas and Connecting Cables

A high-gain unidirectional or omnidirectional antenna — or cantenna — will do wonders for you when you’re scanning your airwaves for wireless systems. When you’re shopping for antennas, look for one with a pigtail connection that matches the type of connector you have on your wireless NIC. Also be aware that the length of these pigtail cables should be kept as short as possible. Because they’re made with a very thin microwave coax, these cables have fairly high signal losses at microwave frequencies and with the connectors placed on either end of the pigtail cable. To avoid high cable losses, you should not use a pigtail cable longer than 5 feet.

GPS Receiver

If you’ll be war-walking/driving/flying — or if your wireless systems span across a large building or campus environment — then it’s time to think globally: A global positioning satellite (GPS) receiver will come in handy. With a GPS receiver, you’ll be able to integrate your wireless testing software and pinpoint the locations of wireless systems within a few meters.

Stumbling Software

To get your wireless testing rolling, wireless stumbling software is essential; you can use it to map out things like SSIDs, signal strength, and systems using WEP encryption. Software you can use for this includes Network Stumbler for Windows or your wireless NIC management software. For really basic stumbling, you can even use the management software built in to Windows XP.

Chapter 16: Ten Essential Tools for Hacking Wireless Networks 305

Wireless Network Analyzer

To probe deep into the airwaves, a network analyzer is essential. Programs such as Kismet, AiroPeek, and ethereal can help you monitor multiple wireless channels, view protocols in use, look for wireless system anomalies — and even capture wireless data right out of thin air.

Port Scanner

A port scanner such as nmap or SuperScan is a great tool for scanning the wireless systems you stumble across to find out more about what’s running and what’s potentially vulnerable.

Vulnerability Assessment Tool

A vulnerability-assessment tool such as Nessus, LANguard Network Security Scanner, or QualysGuard is great for probing your wireless systems further to find out which vulnerabilities actually exist. This information can then be used to poke around further and see what the bad guys can see and even potentially exploit.

Google

It’s not only a great reference tool, but the Google search engine can also be used for searching Network Stumbler .NS1 files, digging in to the Web-server software built in to your APs, finding new wireless-security testing tools, researching vulnerabilities, and more. The Google taskbar (downloadable for Internet Explorer, built in to FireFox) makes your searching even easier.

An 802.11 Reference Guide

While performing ongoing ethical hacks against your wireless systems, you’ll undoubtedly need a good reference guide on the IEEE 802.11 standards at some time or another. The 802.11 wireless protocol is very complex and

will evolve over time. You’ll likely need to look up information on channel frequency ranges, what a certain type of packet is used for, or perhaps a default 802.11 setting or two. The Cheat Sheet, the wireless resources found in Appendix A in this book, as well as Peter’s book Wireless Networks For Dummies are good references that can really help you.

306 Part IV: The Part of Tens

Chapter 17

Ten Wireless Security-Testing

Mistakes

In This Chapter

Skipping planning

Not involving others

Not using a methodology

Forgetting to unwind . . . that’s unbind

Forgetting to get permission

Using the wrong tools

Affecting networks through testing

Using data improperly

Not reporting results and following up

Breaking the law

From our experience, ethical hackers tend to make the same mistakes over and over again. Perhaps they learned from each other. We see no

reason for you to make these same mistakes. In no particular order, the top ten security testing mistakes are as follows:

Skipping the Planning Process

As we stress in Chapter 2, planning is a tedious but extremely important task. You must clearly define the boundaries of your work to avoid any conflict or question of misdeed. Despite all attempts at thoroughness and efficiency in your testing, one of the largest factors in determining the success of a security test is the thoroughness of your planning. The planning process is handled far from the tester’s toolbox. It requires a certain level of project

308 Part IV: The Part of Tens

management and communication skills. Your plan is the company’s official declaration of what it wants to accomplish and how it wants to do it. Remember: Very few people ever arrive at their destinations without first intending to get there.

At a minimum, your plan should specify the following:

The roles and responsibilities for everyone involved in the ethical hack.

The level of involvement of each tester and the importance of her participation in the team.

The schedule for when the testing will take place. Management may prefer that the testing be done when traffic is low, which might translate into late nights, early mornings, or weekends.

Your security defense budget is likely small, so you need to operate with efficiency and creativity to do more with less. So plan carefully and meet the expectation of the plan. Otherwise, in the future, your management or customer may see security testing as an unnecessary cost.

Not Involving Others in Testing

Often the trick to a successful test lies in observing the details. One such detail is the inclusion of other individuals from your organization in the testing process. Talk to your network professionals. Get people involved up-front during planning. They may help you save time or money by providing insight into the network that you might not have.

Ensure that the testing process is closely monitored by others. Involving others during the process may save you reporting time or may save your hide if you’re accused of something you did not do.

Not Using a Methodology

Ethical hacking is different from penetration testing. Ethical hacking is extremely methodical and relies on a method. In Chapter 2, we discuss the concept of the scientific method. You need to adopt or develop a method. Your method should consist of the following steps: planning, testing, and reporting. The method may consist of best practices, such as Open-Source Security Testing Methodolgy Manual (OSSTMM) and Information System Security Assessment Framework (ISSAF). (For more on these terms, refer to Chapter 2.)

Chapter 17: Ten Wireless Security-Testing Mistakes 309

Although having a testing methodology is important, don’t constrict the creativity of the tester by introducing strict methods that affect the quality of the test. Be flexible and leave some tasks open to interpretation.

Forgetting to Unbind the

NIC When Wardriving

Later on in this chapter, we talk about the legalities of ethical hacking. For now, we want to avoid doing anything that someone might perceive as illegal or unethical. At no time should you connect to any access point that isn’t yours. One of the things you can and should do is ensure that your wireless adapter does not authenticate with an access point you stumble upon. This is called autoconnection or accidental association. Avoiding autoconnection is essential.

Some client adapters are more likely than others to connect with any open access point that comes into range, given enough time to perform a DHCP transaction.

To avoid autoconnection, sometimes you must simply disable your client adapter’s client utility before setting out on a wardrive. But that may not work. The only foolproof way to prevent autoconnection is to disable all networking protocols, that is, TCP/IP, NetBEUI, NetWare, and other communication protocols on your wardriving computer. Without a networking protocol, the computer cannot communicate. However, even without a networking protocol, the Wi-Fi client adapter still gathers frames and NetStumbler, or Ethereal can display them.

Your local law enforcement organization may interpret the simple act of associating as computer trespass, so you need to ensure you don’t accidentally associate. The solution is simple. All you need do is unbind the TCP/IP protocol from the wireless adapter.

With accidental association, not only do you have a potential legal problem, but you also have a potential wardriving problem as well. Client adapters that autoconnect to an access point sometimes place the SSID of that access point in the SSID field of the wireless adapter’s operating profile. From that point forward, your wardriving program will not log any additional stations with any other SSIDs. This effectively ends your wardrive, even when you drive around different neighborhoods for a long time.