How to detect a rogue access point wireless network

A Rogue Access Point (AP) is a Wi-Fi access point connected to a network without authorization. In order to protect sensitive data, is essential to avoid the use of unauthorized access points. Like a thief AP is not under the management of network administrators, or need to match policies, network security, unauthorized access points so an attacker can bypass the network security and network to attack or capture sensitiveDate.

monitored in the absence of a wireless sensor for air, security personnel can manually search for rogue APs. An inexpensive but effective way to search for possible villains is to network with a freely available Transmission Control Protocol (TCP) port scanner enabled, TCP port identified by the various connected devices.

The procedure to find a rogue AP to start with the implementation of Port-scanning software from a computer connected to the network.The utility covers all port 80 (HTTP), network interfaces, including points of all Web servers, some printers and almost anyone can access. The AP is usually the port scanner to respond to the name Ping-party and corresponding Internet Protocol (IP).

Once the AP is discovered, it must identify the network administrator, with or without the AP, a rogue. Ideally, the administrator would use a software that would allow a pre-configured list of approvedAccess AP. If you scan for rogue AP is done manually, a list of authorized APs is still required. The approved list may be populated with the following attributes:
MAC address
SSID
Seller
Radio Media Type
ChannelThe cited attributes determined automatically or manually when the software is not used, the instrument detection warning if there are access points with different attributes from the approved list.

As access points are determined to RogueAdministrator must have procedures to identify their positions.

Perhaps the most difficult step in this process, the discovery of the physical location of unauthorized access points is determined. Router table entries can help. A routing table is available on all IP nodes.

The routing table stores information on IP networks and how they can be achieved. Since all nodes perform some type of IP routing, then any node load the TCP / IP has a routing table. If an IP packetto be transmitted, the routing table is used for physical or logical interface is used to determine the package of their destination or next router.

possible with the information from the routing table, an IP address rogue derivatives to determine which node using the address displayed. Note that the position of the nodes must be correlated with the addresses in the routing table. Surgical removal of the limited RF signal may be useful in reducingphysical location of the unauthorized access point as well.

Perhaps the most basic step to protect against unauthorized access point can, with a security policy. A security policy should be an overview of the rules against unauthorized wireless devices and employees should be educated on the policy. This will help users more frequent unauthorized devices, employees.

July 30, 2010. Tags: , , , . computer network. Leave a comment.

Wireless Access Point 20 Second Hack

The placement of wireless access point is the first level of security to the wireless network. If your wireless access point can physically by a passer, you have big problems contact.

The simplest way to hack a wireless access point is walk up to it and press the reset switch. This defect poof back to an open network and you have keys to the kingdom

If the wireless access point, the only thing that you should be able to see, maybethe antenna. Purchase Access Point antennas that seem plates, or fire alarms.

If a hacker is probing your palace in the Wireless Network, is happy for access points. If you can determine which brand and model of your access point, can search on the Internet for the default passwords and vulnerabilities of this Access Point.

Finally, if you test your wireless open and make the building as far as possible mix. We recommendUsing a directional antenna wireless, the apartment has a wall instead of a Yagi antenna, which screams look at me.

wireless access points in 20 seconds or less, crushed when mounted in the wrong place. The secure wireless network that no one knows.

May 31, 2010. Tags: , , . computer network. Leave a comment.

Wireless Networking – Router Vs Access Point


Image : http://www.flickr.com

When planning your wireless network then you might ask, what is the difference between a router and access point. You must think of a router as more of a server, because performs many functions, such as a server. Access Point is a portal for wireless client to connect to existing LANs.

Router can control various functions. Router can connect to many different WLANs together acting as a policeman. Routers also act as a DHCP server. DHCP Server assigns dynamic IP address of your computer every time you start your computer. If you do not have a DHCP server, then you should carry on any computer network a permanent IP address.

As I said before, the router to act as a policeman. You can use a router to do port forwarding to certain computers on your LAN. For example, you can divert all Internet traffic in search of your port number of the gaming server at a certain> Computers on the LAN.

The possibility to connect multiple computers to the Internet is one of the most important functions of the router. The router is a WAN IP address assigned by your ISP. This IP address is called a public IP address that anyone can see on the Internet. Why have multiple routers connected to the computer, the router uses a protocol called NAT (Network Address Translation) NAT to assign private IP is the computer behind your router IP addressAddresses. NAT acts as a firewall because computers can not through the Internet, in theory even your computer. Just see the IP address of the router. NAT does not block traffic from reaching your computer, but not block out the Trojans to the Internet. That is why I recommend installing a firewall on your computer on your LAN.

The role of an access point on a LAN is to give the user an access door to yield. Most people who enter the door at the same time,they will go slower. 802.11b access points say, they give you a series of 11mps But the real rate is about 5MPS. 802.11g is an evaluation of 54 Mbit / s, with an actual share of 20Mbps through. The access points usually have the same security features as a router, such as WEP, WPA and 8021x TKPI But it will be the traffic cop functions like a router. The access points do not have NAT, the network would add an unnecessary layer. To make it easier to accessPoints to simulate just connect your laptop to a door in the wall, and this is it. network routers using the border with you for things to do than an alert to decide who can enter and blocking those who want to keep.

April 16, 2010. Tags: , , , . computer network. Leave a comment.

Next Page »

Design a site like this with WordPress.com
Get started