Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection
|
|
|
- Herbert Wright
- 10 years ago
- Views:
Transcription
1 Layer 2 Analysis of WLAN Discovery Applications for Intrusion Detection Joshua Wright, GCIH, CCNA [email protected] 11/8/2002 Abstract Wireless LAN discovery through the use of applications such as NetStumbler, DStumbler, Wellenreiter and others is an increasingly popular technique for network penetration. The discovery of a wireless LAN might be used for seemingly innocuous Internet access, or to be used as a "backdoor" into a network to stage an attack. This paper reviews some of the tactics used in wireless LAN network discovery and attempts to identify some of the fingerprints left by wireless LAN discovery applications, focusing on the MAC and LLC layers. This fingerprint information can then be incorporated into intrusion detection tools capable of analyzing data-link layer traffic. Introduction The growth of networks has been met with the development of several wireless local area network (WLAN) discovery applications. These applications are designed to identify WLAN activity and network characteristics, providing enough information for an unauthorized user to gain access to the target network. For obvious reasons, WLAN administrators should be concerned about unauthorized access to their networks and therefore should attempt to identify the applications used to discover their networks. WLAN intrusion analysis is not entirely unlike traditional intrusion analysis; we are primarily concerned about the identification of traffic signatures or fingerprints that are unique to the applications we want to detect. Unlike traditional intrusion analysis however, we have additional challenges that are unique to wireless networks: 1. Location of traffic capture station Where traditional intrusion detection systems can be location in a functional area (DMZ, inside a firewall, outside a firewall, etc), a data collection agent (agent) capturing frames must be installed in the same service area of each wireless LAN we wish to monitor. The improper location of a wireless LAN agent will inevitably lead to false positive results. If the receive sensitivity of the agent exceeds that of the monitored network, traffic may be characterized as WLAN discovery while being outside the cell range of the monitored network. Another interesting challenge is monitoring "hidden node" IBSS stations where the last wireless station to generate a beacon is responsible to reply to probe requests (ANSI/IEEE, 126). In these cases, the wireless LAN agent may not be within the coverage area necessary to collect responses or further solicitation of management information from the responding hidden node station. Copyright 2002, Joshua Wright. All rights reserved. 1 of 13
2 2. Identifying anomalous traffic In order for wireless clients to locate a network to join, the IEEE specification made an accommodation for clients to broadcast requests for available networks. Applications like NetStumbler and DStumbler utilize this and other scanning techniques to discover wireless LANs. Since these techniques are part of the specification, we should expect to see their use for legitimate network discovery. Fortunately, the scanning techniques used by NetStumbler and DStumbler that are presented here are anomalous when compared to the specification and can be detected among otherwise legitimate network scanning traffic. Characteristics for Analysis Through lab experimentation and the analysis of "hostile" network activity, I have found several fields of interest that are pertinent to the analysis and discovery of WLAN discovery applications. 1. Sequence number A sequence control field is used to accommodate fragmentation of frames. Two bytes in length, the first 4 bits (low order) are used to uniquely identify each fragment with the remaining 12 bits used to uniquely identify the frame based on a modulo 4096 counter (Gast, 41). The sequence number portion of the sequence control field is analogous to its upper-layer counterpart, the IPID field. 2. Control Type and Subtype The control type and control subtype fields utilize two bytes of the frame control structure to identify data, management and control frames used to support the robust operation of networks. Common type/subtype combinations include 00/0100 (probe request), 00/0101 (probe response), 00/1000 (beacon) and 10/0000 (data). As many of the remaining combinations of type and subtype are reserved for future use, we will likely see a good deal of experimentation to elicit unique responses to unexpected frame types. 3. Destination MAC A client seeking to discover available wireless networks through active scanning will transmit a probe request frame to the MAC layer broadcast address ( FF:FF:FF:FF:FF ). 4. Service Set Identifier (SSID) In addition to setting the destination MAC address to the broadcast address, the SSID is set to a value of 0x00 in probe request frames. The last station to communicate in an IBSS network is responsible for responding with the network SSID to probe requests. In infrastructure networks, the access point (AP) is responsible for responding to probe requests with its configured SSID, unless otherwise directed. 5. Organizationally Unique Identifier (OUI) Part of the LLC frame encapsulation, the OUI field consists of three bytes used to uniquely identify a vendor as part of a convention for locally administered protocol identifiers. This value will commonly be set to all 0's for encapsulated Ethernet frames. Copyright 2002, Joshua Wright. All rights reserved. 2 of 13
3 6. Data Payload The data payload of LLC frames may contain unique information for use in identifying the network discovery application generating the traffic. 7. LLC Protocol Type Field The LLC protocol type field specifies the upper-layer protocol type. Common examples include 0x0800 for IP traffic, 0x0806 for ARP and 0x888e for 802.1x authentication. 8. LLC Protocol ID Part of the SNAP header, the LLC protocol ID number is used to specify the protocol type used with the particular OUI specified in the frame. Research Techniques and Data Collection Ethereal version was the primary tool for data collection using, Libpcap version 0.7 libraries. A Cisco Aironet 352 card was used with Cisco Aironet version 1.8 drivers. The capture host ran Slackware 8.1 Linux and a custom kernel. Where noted, various hosts were used to generate sample traffic that was later analyzed for pattern matching signatures. Each test set was performed in multiple permutations: against WEP-protected and open networks; with and without client power management enabled; and with an AP using beaconing SSID advertisements and with an AP configured to not beacon its ESSID (a cloaked ESSID configuration). After identifying unique characteristics of the application data, Ethereal was used on a Sun Microsystems Sun Fire 280R to analyze datasets collected by the author from various network security conferences including SANSFIRE 2002 and DEFCON X, as well as against packet captures from various production wireless networks maintained by the author. For the sake of confidentiality, the traces provided as examples are from lab-generated traffic, although each traffic pattern has been identified in multiple dissimilar environments. Active Probing vs RF Monitoring Network discovery applications will typically employ one of two different techniques when discovering wireless LANs. Each has their advantages and disadvantages, as explained below. Active Probing Described in the IEEE specifications (ANSI/IEEE, 126), the active probing method uses probe request frames on each channel where it is able to detect wireless activity (to avoid blocking the discovery process on frequencies that are not in use). When an AP comes within range of the client and receives a probe request frame it will typically respond with a probe response frame containing the network ESSID. Copyright 2002, Joshua Wright. All rights reserved. 3 of 13
4 The active scanning method for network discovery is the easiest to implement and is presently the only network discovery method used on Windows systems. This method has the distinct disadvantage of being unable to discover wireless networks that are configured not to advertise their ESSID using a cloaked ESSID configuration. Furthermore, the active scanning method requires the client to communicate actively with the AP, giving the intrusion analyst the opportunity to discover the intrusion. RF Monitoring An increasing number of WLAN discovery applications utilize a completely passive method of WLAN discovery known as radio frequency monitoring (RFMON). A client with a wireless card that is configured in RFMON mode will be able to capture all RF signals on the channels to which it is configured to listen. WLAN discovery applications using the RFMON discovery technique will interpret and display information about the networks they are able to receive; it will do so without the limitation of presenting only information discovered in probe request and probe response frames. As a completely passive technique, it is very difficult for the intrusion analyst to discover this activity at the MAC layer. This passive discovery technique does present some distinct disadvantages to the attacker. At the time of this writing, free network discovery applications using RFMON scanning are only available on Linux and BSD-based operating systems, with limited chipset support on BSD hosts. Through the work of ghandi ([email protected]), Mac OS X clients are now able to utilize Apple AirPort cards for passive monitoring (Ghandi). Some commercial products are available for Windows, but at significant cost. While in RFMON mode, wireless clients are unable to transmit any frames; their cards are only able to receive, and therefore capture traffic. This limits the client to reporting only current or recorded network traffic. For instance, a client using passive monitoring would be able to report on the MAC addresses and number of associations to a discovered AP, but would be unable to probe the discovered AP for SNMP MIB information. The client would be able to report the results of an SNMP GET request, however, if the request initiated from a different card or a different client in the same frequency and in proximity to the attacker. A small window of opportunity does exist, however, to fool the attacker with falsified network management traffic. Since the RFMON client captures all traffic on its listening frequency, it is only a matter of protocol decoding for the tool author to present information to the user about traffic seen on the network. Some of the more advanced tools provide full DHCP packet dissection and reporting, as well as reporting Cisco Discovery Protocol (CDP), BOOTP and SNMP traffic. Since the client cannot transmit while the wireless card is in RFMON mode, they have little opportunity to validate the source of the generated traffic as legitimate. The intrusion analyst could generate falsified network management frames in the form of DHCP address allocation, CDP advertisements, or SNMP MIB information to and from non-existent hosts Copyright 2002, Joshua Wright. All rights reserved. 4 of 13
5 on the network. The WLAN discovery application would interpret this information and dutifully report the results to the attacker. The intrusion analyst could then monitor network traffic with traditional layer 3+ intrusion detection tools, looking for probes based on this falsified data (for example, watching for an SNMP string that was used to collect false MIB information). Should the falsified network management traffic be "interesting" to the attacker, they may opt to remove their card from RFMON mode in order to gain the ability to transmit frames and associate with the discovered network. A practical example of this technique is as follows: An administrator generates DHCP response frames that appear as if addresses in the range /24 are being allocated to clients (this type of traffic could be generated with a short Perl or C program). A passive WLAN discovery application would report to its user, the attacker, that it is seeing a DHCP server issue addresses in the noted range. An attacker, curious to discover what services these hosts are offering, might try to obtain a valid network address by requesting a DHCP address or by specifying an "unallocated" static address. It is likely that the attacker would then attempt to perform port scanning and/or host fingerprinting against all the hosts that were noted by the network discovery application as having received DHCP leases. An intrusion analyst would only need to monitor their network for signs of activity to the falsified network address advertisements and then capture traffic and generic RF traffic statistics about the attacker. Through the use of triangulation techniques, the intrusion analyst might even be able to establish the location of the assailant. This approach may not be well suited to all intrusion analysts, resembling more closely a honeypot than a traditional intrusion analysis technique. As a potential alternative, there is ongoing research in attempting to discovery passive network discovery tactics through the use of physical layer RF characteristics that may be more applicable to high-security environments (reference). Detecting NetStumbler - Name: NetStumbler, MiniStumbler - Download: - Source available: no - Discovery method: Active Scanning/Probing - Features: Simple install, GPS support, probes discovered AP for additional information - Supported chipsets: Lucent - Supported platforms: Windows, Pocket PC - Author: Marius Milner NetStumber is a very popular tool for Windows users, utilizing active scanning through the use of probe requests sent to a broadcast address with a broadcast BSSID and an unspecified ESSID (length of 0). The probe requests are difficult to identify definitively as NetStumbler activity since NetStumbler utilizes the active scanning method described in the IEEE specification without anomalous characteristics. Once an AP is discovered however, NetStumbler will probe a discovered AP for its "nickname" information, often the same information stored in the SNMP MIB system.sysname.0 parameter. This LLC/SNAP frame contains unique characteristics that allow us to uniquely identify NetStumbler activity. Copyright 2002, Joshua Wright. All rights reserved. 5 of 13
6 In a posting to the Kismet Wireless mailing list on March , Mike Craik first identified a unique pattern that can be used to identify NetStumbler traffic (Craik). LLC-encapsulated frames generated by NetStumbler will use an organizationally unique identifier (OID) of 0x00601d and protocol identifier (PID) of 0x0001. NetStumber also uses a data payload size of 58 bytes containing a unique string that can be used to identify the version of NetStumbler: NetStumbler Version Payload String Flurble gronk bloopit, bnip Frundletrune All your b are belong to us intentionally blank 1 1 Note leading spaces. To identify NetStumbler traffic we can use the following Ethereal display filter to detect any of the data string patterns that match the OUI and PID criteria: (wlan.fc.type_subtype eq 32 and llc.oui eq 0x00601d and llc.pid eq 0x0001) and (data[4:4] eq 41:6c:6c:20 or data[4:4] eq 6c:46:72:75 or data[4:4] eq 20:20:20:20) The following detect is taken from NetStumbler version using a Windows 2000 host for discovery. IEEE Type/Subtype: Data (32) Frame Control: 0x0908 Version: 0 Type: Data frame (2) Subtype: 0 Flags: 0x9 DS status: Frame is entering DS (To DS: 1 From DS: 0) (0x01) = Fragments: No fragments = Retry: Frame is being retransmitted = PWR MGT: STA will stay up = More Data: No data buffered = WEP flag: WEP is disabled = Order flag: Not strictly ordered Duration: 258 BSS Id: 00:50:18:07:13:92 (ADVANCED_07:13:92) Source address: 00:02:2d:52:cb:27 (Agere_52:cb:27) Destination address: 00:50:18:07:13:92 (ADVANCED_07:13:92) Fragment number: 0 Sequence number: 3057 Logical-Link Control DSAP: SNAP (0xaa) IG Bit: Individual SSAP: SNAP (0xaa) CR Bit: Command Control field: U, func = UI (0x03) = Unnumbered Information = Unnumbered frame Organization Code: Unknown (0x00601d) Protocol ID: 0x0001 Data (58 bytes) c 6c f All your e c 6f 6e b are belong f e fe ca ba ab to us.... Copyright 2002, Joshua Wright. All rights reserved. 6 of 13
7 0030 ad de 0f d0 4f OECEFF MiniStumbler is a similar tool compiled to run on the Microsoft Pocket PC platform. Although the binary ministumbler.exe program contains the string All your b are belong to us, this version of NetStumbler does not exhibit the same characteristics as its Win32 counterpart. MiniStumbler will not send a data probe to a discovered AP. Recent trends in the NetStumler online discussion forums indicate that NetStumbler users are well aware of the intrusion detection possibilities that exist with NetStumbler. Several posts have recommended using a binary file editor to change the "All your b are belong to us." string in the netstumbler.exe program file to avoid detection. Detecting DStumbler - Name: DStumbler, bsd-airtools - Download: - Source available: yes - Discovery method: Active Scanning/Probing or Passive RF Monitoring - Features: Reports APs with default configuration, GPS support, reports additional information about discovered networks (WEP enabled, beacon interval, node detection) - Supported chipsets: Any that are supported by host OS, Prism II for Passive RF Monitoring - Supported platforms: NetBSD, FreeBSD, OpenBSD - Author: h1kari DStumbler is an open-source curses-based application for use on BSD-based systems. DStumbler offers two methods of scanning for wireless networks: active probe/response scanning (similar to NetStumbler) and passive (RFMON) scanning. Several additional features are also available including support for additional card chipsets; additional reporting on discovered networks (number active nodes, beacon intervals, default SSIDs, supported data rates); and reports a partial detect for WEP key lengths. Unlike NetStumbler, DStumbler does not actively probe discovered any APs for additional information, instead presenting additional detail derived solely from the data it discovers. When in active scanning mode, DStumbler does have unique qualities that make it possible for us to detect its probe request frames. In a posting to the Kismet Wireless mailing list on March , Mike Craik first identified a pattern for identifying DStumbler traffic using only WLAN sequence numbers in the pattern 0, 3, 6, 9, 11 (Craik2). I was able to reproduce this pattern, but discovered that it is inconsistent when capturing DStumbler activity on different channels. When DStumbler starts in active scan mode, it will generate multiple probe request frames (frame control 0x0040) using low-numbered, modulo 12 sequence number values. After receiving a probe response from an AP, DStumbler will attempt to authenticate, and then associate with, the AP. The Copyright 2002, Joshua Wright. All rights reserved. 7 of 13
8 authenticate frame uses a consistent sequence value of 11 (0x0b), and the following association request uses a sequence value of 12 (0x0c). This pattern will repeat until DStumbler does not receive probe response frames from AP. Unfortunately, a simple per-packet pattern-matching algorithm will not be able to identify DStumbler activity reliably; instead we need to identify a repetitive pattern of activity. We can use the following Ethereal display filter to create a data extract which we can then manually inspect for the repeating authentication frames with a sequence of 11 and associate frames with a sequence of 12: (wlan.seq eq 11 and wlan.fc.subtype eq 11) or (wlan.seq eq 12 and wlan.fc.subtype eq 00) The following detect was generated using DStumbler 1.0 on a FreeBSD client. IEEE Type/Subtype: Authentication (11) Frame Control: 0x00B0 Version: 0 Type: Management frame (0) Subtype: 11 Flags: 0x0 DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00) = More Fragments: This is the last fragment = Retry: Frame is not being retransmitted = PWR MGT: STA will stay up = More Data: No data buffered = WEP flag: WEP is disabled = Order flag: Not strictly ordered Duration: 258 Destination address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Source address: 00:02:2d:0a:01:de (00:02:2d:0a:01:de) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 11 IEEE wireless LAN management frame Fixed parameters (6 bytes) Authentication Algorithm: Open System (0) Authentication SEQ: 0x0001 Status code: Successful (0x0000) IEEE Type/Subtype: Association Request (0) Frame Control: 0x0000 Version: 0 Type: Management frame (0) Subtype: 0 Flags: 0x0 DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00) = More Fragments: This is the last fragment = Retry: Frame is not being retransmitted = PWR MGT: STA will stay up = More Data: No data buffered = WEP flag: WEP is disabled = Order flag: Not strictly ordered Duration: 258 Destination address: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Source address: 00:02:2d:0a:01:de (00:02:2d:0a:01:de) BSS Id: 00:e0:63:82:19:c6 (00:e0:63:82:19:c6) Fragment number: 0 Sequence number: 12 IEEE wireless LAN management frame Copyright 2002, Joshua Wright. All rights reserved. 8 of 13
9 Fixed parameters (4 bytes) Capability Information: 0x = ESS capabilities: Transmitter is an AP = IBSS status: Transmitter belongs to a BSS = Privacy: AP/STA can support WEP = Short Preamble: Short preamble not allowed = PBCC: PBCC modulation not allowed = Channel Agility: Channel agility not in use CFP participation capabilities: No point coordinator at AP (0x0000) Listen Interval: 0x0001 Tagged parameters (9 bytes) Tag Number: 0 (SSID parameter set) Tag length: 1 Tag interpretation: Tag Number: 1 (Supported Rates) Tag length: 4 Tag interpretation: Supported rates: [Mbit/sec] DStumbler supports the ability to passively detect networks using Prism II cards in RFMON mode, which does not leave a noticeable fingerprint. Detecting Wellenreiter - Name: Wellenreiter - Download: - Source available: yes - Discovery method: Passive RF Monitoring - Features: GPS support, reports default ESSIDs, embedded statistics engine for collection of signal strength, packet counters, and other related information. Wellenreiter is also the only tool that employs an ESSID brute-force attack script. - Supported chipsets: Lucent, Cisco, Prism II - Supported platforms: Linux, experimental BSD - Author: Max Moser Wellenreiter is a Perl/Gtk+ application for use on Linux systems. Wellenreiter only supports network discovery through RFMON packet capture, but includes some additional features using a second network card, including ESSID brute-forcing and automatic network association. It is through these features that we are able to identify Wellenreiter-generated traffic. When an ESSID brute-force attack is initiated, Wellenreiter will use the Linux "iwconfig" program to temporarily set its ESSID to "this_is_used_for_wellenreiter". The MAC address will also be set to a random value (with a consistent leading 00 to avoid generating MAC addresses that might be confused as multicast traffic). The following code fragment is taken from Wellenreiter version 1.6: system("$fromconf{iwpath} $fromconf{interface} essid 'this_is_used_for_wellenreiter'"); system("$fromconf{ifconfig} $fromconf{interface} down"); my $brutessid = shift (@g_wordlist); my $mactouse = build_a_fakemac; system("$fromconf{ifpath} $fromconf{interface} hw ether $mactouse"); print STDOUT "\ni test now the essid: $brutessid"; system("$fromconf{iwpath} $fromconf{interface} essid $brutessid"); system("$fromconf{ifpath} $fromconf{interface} up"); return ($true); Copyright 2002, Joshua Wright. All rights reserved. 9 of 13
10 This code will generate probe request frames using the fixed ESSID between attempts to guess the ESSID of a selected AP. We can identify this traffic with the follow Ethereal display filter: wlan.fc eq 0x0040 and wlan_mgt.tag.number eq 0 and wlan_mgt.tag.length eq 29 and wlan_mgt.tag.interpretation eq this_is_used_for_wellenreiter The following detect was generated using Wellenreiter v1.6 on a Slackware Linux workstation using a stock kernel: IEEE Type/Subtype: Probe Request (4) Frame Control: 0x0040 Version: 0 Type: Management frame (0) Subtype: 4 Flags: 0x0 DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00) = Fragments: No fragments = Retry: Frame is not being retransmitted = PWR MGT: STA will stay up = More Data: No data buffered = WEP flag: WEP is disabled = Order flag: Not strictly ordered Duration: 0 Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:40:96:47:e2:7d (00:40:96:47:e2:7d) BSS Id: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Fragment number: 0 Sequence number: 3849 IEEE wireless LAN management frame Tagged parameters (37 bytes) Tag Number: 0 (SSID parameter set) Tag length: 29 Tag interpretation: this_is_used_for_wellenreiter Tag Number: 1 (Supported Rates) Tag length: 4 Tag interpretation: Supported rates: [Mbit/sec] ff ff ff ff ff ff e ff ff ff ff ff ff 90 f0 00 1d f 69...this_i f f 66 6f 72 5f c 6c 65 s_used_for_welle e b 16 ff ff ff nreiter ff. Wellenreiter also uses randomized MAC addresses, in an effort to increase the level of anonymity for the attacker. Using a random MAC address does give the intrusion analyst an opportunity to detect anomalous MAC addresses, that is those addresses that utilize organizationally unique identifiers for the first three octets of the MAC address that are unallocated by IEEE standards body, or MAC addresses that are allocated, but not used for network cards. In order to support this effort, the intrusion analyst needs a database of MAC OUI prefixes that are expected to be received on the wireless interface of an AP. Supporting this effort, Colin Grady has established a database at where users can submit their MAC address prefixes, manufacturer name and card type. Since Wellenreiter network discovery is performed passively through the use of RFMON listening, we are unable to detect that portion of the application through layer 2 traffic analysis. Copyright 2002, Joshua Wright. All rights reserved. 10 of 13
11 Detecting Windows XP - Name: Windows XP, Microsoft Corp. - Information: - Source available: no - Discovery method: Active Scanning/Probing - Features: Support for wireless networking built into operating system, simple procedure for network scanning. - Supported chipsets: Lucent, Cisco, Prism Windows XP is the first Microsoft operating system to include built-in support for wireless networking. One of the wireless service extensions in Windows XP is a network scanning service that a user can run to obtain a list of available SSIDs. Access to this service is available through the wireless control panel applet. A detection method for identifying Windows XP WLAN scanning is presented here for completeness. Windows XP utilizes the active scanning method to discover available access points through the use of probe request frames with a broadcast SSID and a second unique SSID value. It is through this second SSID value that we can identify Windows XP network scanning. In probe request frames, Windows XP will set a tagged parameter as a portion of the management frame using a length of 32 bytes. The tagged parameter is part of the SSID Parameter Set type, using a string of non-printable characters. This data string is presented in hexadecimal below: 0x14 0x09 0x03 0x11 0x04 0x11 0x09 0x0e 0x0d 0x0a 0x0e 0x19 0x02 0x17 0x19 0x02 0x14 0x1f 0x07 0x04 0x05 0x13 0x12 0x16 0x16 0x0a 0x01 0x0a 0x0e 0x1f 0x1c 0x12 As 32 bytes is the maximum size of the SSID field and due to the randomness of the string, I believe this traffic pattern is the likely result of a bug in the implementation of wireless networking drivers supplied with Windows XP. For this reason, I believe Microsoft will likely remove this unique signature from future Windows operating systems, possibly fixing this bug in later patches and releases of the Windows XP operating system. We can use the following Ethereal display filter to identify Windows XP workstations scanning for wireless networks: wlan.fc eq 0x0040 and wlan_mgt.tag.number eq 0 and wlan_mgt.tag.length eq 32 and wlan_mgt.tag.interpretation[0:4] eq 0c:15:0f:03 The following detect was generated using Windows XP, service pack 1: IEEE Type/Subtype: Probe Request (4) Frame Control: 0x0040 Version: 0 Type: Management frame (0) Subtype: 4 Copyright 2002, Joshua Wright. All rights reserved. 11 of 13
12 Flags: 0x0 DS status: Not leaving DS or network is operating in AD-HOC mode (To DS: 0 From DS: 0) (0x00) = More Fragments: This is the last fragment = Retry: Frame is not being retransmitted = PWR MGT: STA will stay up = More Data: No data buffered = WEP flag: WEP is disabled = Order flag: Not strictly ordered Duration: 0 Destination address: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Source address: 00:60:1d:f0:91:68 (00:60:1d:f0:91:68) BSS Id: ff:ff:ff:ff:ff:ff (ff:ff:ff:ff:ff:ff) Fragment number: 0 Sequence number: 20 IEEE wireless LAN management frame Tagged parameters (40 bytes) Tag Number: 0 (SSID parameter set) Tag length: 32 Tag interpretation: \024\t\003\021\004\021\t\016\r\n\016\031\002\027\031\002\024\037\a\004\005\023\022\026\026\n\001\n\0 16\037\034\022 Tag Number: 1 (Supported Rates) Tag length: 4 Tag interpretation: Supported rates: [Mbit/sec] Conclusion While it is possible to detect some wireless network discovery tools, intrusion detection monitoring on wireless networks is a difficult task. Few tools presently exist that are capable of analyzing layer frames and even fewer that provide the free-form pattern matching that is a critical component to intrusion detection engines. The complexity of intrusion detection does not reduce the need for such tools however; new methods of attack are rapidly introduced while the feature list of WLAN discovery application grows. Establishing intrusion detection probes to cover all the serviceable areas of anything larger than the simplest wireless LAN will likely prove to be cost-prohibitive. A much more elegant solution would be to provide some intrusion analysis and reporting features in today s enterprise access points. With presumably simple software, the access point would be able to detect and report denial-of-service attacks such as (deassociate and associate floods), the presence of previously undetected access points (including fake advertisements generated by tools such as FakeAP), and the evidence of traffic signatures, such as those presented in this paper. It is the author s opinion that the adoption of such features would provide a significant advantage over competing products in the enterprise marketplace. Copyright 2002, Joshua Wright. All rights reserved. 12 of 13
13 Works Cited ANSI/IEEE Standard, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Craik. Craik, Mike. All Your b Are Belong To Us (Netstumbler Signature). Online Posting. 28 Mar :07: Kismet Wireless list. URL: (14 Oct. 2002). Craik2. Craik, Mike. RE: All Your b Are Belong To Us (Netstumbler Signature). Online Posting. 28 Mar :42: Kismet Wireless list. URL: (14 Oct. 2002). Gast, Matthew S Wireless Networks, The Definitive Guide. Sebastopol, CA: O Reilly & Associates, Inc., April Ghandi. Dope Squad Security Viha Mac OS X Wireless Tools. URL: (14 Oct 2002). Copyright 2002, Joshua Wright. All rights reserved. 13 of 13
WIRELESS LAN SECURITY (IEEE 802.11b) A Thesis. Submitted to the Department of Computer Science and Engineering. BRAC University.
WIRELESS LAN SECURITY (IEEE 802.11b) A Thesis Submitted to the Department of Computer Science and Engineering of BRAC University By Iftheker Mohammad Student ID: 03201076 & Mohammad Ashik Elahi Student
Wireless LAN Pen-Testing. Part I
Wireless LAN Pen-Testing Part I To know your Enemy, you must become your Enemy (Sun Tzu, 600 BC) Georg Penn 23.03.2012 Motivation Read manuals, documentation, standards Check sources for their reliability,
Basic processes in IEEE802.11 networks
Module contents IEEE 802.11 Terminology IEEE 802.11 MAC Frames Basic processes in IEEE802.11 networks Configuration parameters.11 Architect. 1 IEEE 802.11 Terminology Station (STA) Architecture: Device
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
PwC. Outline. The case for wireless networking. Access points and network cards. Introduction: OSI layers and 802 structure
PwC Outline Wireless LAN Security: Attacks and Countermeasures 1. Introduction 2. Problems with 802.11 security 3. Attacks on and risks to Wireless Networks 4. Defending wireless networks ISACA Hong Kong
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
How To Understand The Power Of A Network On A Microsoft Ipa 2.5 (Ipa) 2.2.2 (Ipam) 2-2.5-2 (Networking) 2 (Ipom) 2(2
Workshop Presentation Chapter4 Yosuke TANAKA Agenda(Framing in Detail) Data Frames Control Frames type RTS Duration CTS Addressing (!!important!!) Variation on Data Frame Theme Applied Data Framing ACK
Legacy 802.11 Security
Legacy 802.11 Security Contents Authentication Open System Authentication Shared Key Authentication Wired Equivalent Privacy (WEP) Encryption Virtual Private Networks (VPNs) Point-to-Point Tunneling Protocol
Security in IEEE 802.11 WLANs
Security in IEEE 802.11 WLANs 1 IEEE 802.11 Architecture Extended Service Set (ESS) Distribution System LAN Segment AP 3 AP 1 AP 2 MS MS Basic Service Set (BSS) Courtesy: Prashant Krishnamurthy, Univ Pittsburgh
Your 802.11 Wireless Network has No Clothes
Your 802.11 Wireless Network has No Clothes William A. Arbaugh Narendar Shankar Y.C. Justin Wan Department of Computer Science University of Maryland College Park, Maryland 20742 March 30, 2001 Abstract
802.11. Markku Renfors. Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak
802.11 Markku Renfors Partly based on student presentation by: Lukasz Kondrad Tomasz Augustynowicz Jaroslaw Lacki Jakub Jakubiak Contents 802.11 Overview & Architecture 802.11 MAC 802.11 Overview and Architecture
WiFi Security Assessments
WiFi Security Assessments Robert Dooling Dooling Information Security Defenders (DISD) December, 2009 This work is licensed under a Creative Commons Attribution 3.0 Unported License. Table of Contents
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
NetStumbler v0.4.0 Release Notes
NetStumbler v0.4.0 Release Notes Marius Milner Thank you for your interest in NetStumbler. It is provided to you as a convenience, at no cost and without warranty. If you don't like
Wiereless LAN 802.11
Tomasz Kurzawa Wiereless LAN 802.11 Introduction The 802.11 Architecture Channels and Associations The 802.11 MAC Protocol The 802.11 Frame Introduction Wireless LANs are most important access networks
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
Wireless Traffic Analysis. Kelcey Tietjen DF Written Report 10/03/06
Wireless Traffic Analysis Kelcey Tietjen DF Written Report 10/03/06 Executive Summary Wireless traffic analysis provides a means for many investigational leads for a forensic examination. It can provide
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
Detection of Promiscuous Nodes Using ARP Packets
Detection of Promiscuous Nodes Using ARP Packets Version 1.0 Written by: 31Aug01 Daiji Sanai Translated by: Kelvin KingPang Tsang http://www.securityfriday.com 1 Contents Abstract...3
Access Point Configuration
Access Point Configuration Developed by IT +46 Based on the original work of: Onno Purbo and Sebastian Buettrich Goals Provide a general methodology to installation and configuration of access points Give
IEEE 802.11 frame format
IEEE 802.11 frame format Pietro Nicoletti www.studioreti.it 802-11-Frame - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright and international treaties. The title and
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
Oudot Laurent [email protected] http://rstack.org/oudot/
WLAN and Stealth Issues Oudot Laurent [email protected] http://rstack.org/oudot/ Agenda WLAN security & some related physical issues Problems with open services Classical solutions for TCP/IP open services
RF Monitor and its Uses
RF Monitor and its Uses Pradipta De [email protected] Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
Network Discovery Protocol LLDP and LLDP- MED
Network LLDP and LLDP- MED Prof. Vahida Z. Attar College of Engineering, Pune Wellesely Road, Shivajinagar, Pune-411 005. Maharashtra, INDIA Piyush chandwadkar College of Engineering, Pune Wellesely Road,
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
Verifying Detection of Asset Tags in WLAN Controllers
APPENDIXB Verifying Detection of Asset Tags in WLAN Controllers Asset Tags Detection The protocol analyzer trace in Figure B-1 provides important information with regard to how asset tags compliant with
Security Awareness. Wireless Network Security
Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition
Wireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
Attacking Automatic Wireless Network Selection. Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com
Attacking Automatic Wireless Network Selection Dino A. Dai Zovi and Shane A. Macaulay {ddaizovi,smacaulay1}@bloomberg.com We made Slashdot! Hackers, Meet Microsoft "The random chatter of several hundred
Configuration. Windows 98 and Me Configuration
Configuration Windows 98 and Me Configuration Installing the TCP/IP Protocol Windows 2000 Configuration Windows XP Configuration Wireless Configuration 128-Bit Encryption Wireless Security in Windows XP
Wireless LAN Security I: WEP Overview and Tools
Wireless LAN Security I: WEP Overview and Tools Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-09/
Tools for Attacking Layer 2 Network Infrastructure
Tools for Attacking Layer 2 Network Infrastructure Kai-Hau Yeung, Dereck Fung, and Kin-Yeung Wong Abstract Data Link layer is considered as the weakest link in a secured network. If an initial attack comes
MN-700 Base Station Configuration Guide
MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points. http://www.veryxtech.com
White paper Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points http://www.veryxtech.com White Paper Abstract Background The vulnerabilities spotted in the Wired Equivalent Privacy (WEP) algorithm
Wireless Tools. Training materials for wireless trainers
Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012
TECHNICAL NOTE GoFree WIFI-1 web interface settings Revision Comment Author Date 0.0a First release James Zhang 10/09/2012 1/14 Web interface settings under admin mode Figure 1: web interface admin log
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
Chapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
Top 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
Section 1 Wireless Packet Captures & Connection Analysis- A Review
Section 1 Wireless Packet Captures & Connection Analysis- A Review Many of you will have already used many of these tools, or at least had some experience with them in previous CWNP or vendor Wireless
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
Enhancing the Security of Corporate Wi-Fi Networks Using DAIR. Example : Rogue AP. Challenges in Building an Enterprise-scale WiFi Monitoring System
Challenges in Building an Enterprise-scale WiFi Monitoring System Enhancing the Security of Corporate Wi-Fi Networks Using DAIR Scale of WLAN Microsoft s WLAN has over 5 APs Paramvir Bahl, Ranveer Chandra,
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
Top 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
Wireshark Hands-On Exercises
Wireshark Hands-On Exercises Step 1. Plug in the Airpcap USB device. Step 2. Step 3. Open Wireshark Start Wireless Tools Wireshark. Click on Capture Interfaces. Step 4. Choose the AirPcap USB adapter and
Unverified Fields - A Problem with Firewalls & Firewall Technology Today
Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group [email protected] October 2000 1 Introduction The following problem (as discussed in
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Chapter 2 Wireless Networking Basics
Chapter 2 Wireless Networking Basics Wireless Networking Overview Some NETGEAR products conform to the Institute of Electrical and Electronics Engineers (IEEE) 802.11g standard for wireless LANs (WLANs).
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
802.11 standard. Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale
802.11 standard Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale IEEE 802.11 Requirements Design for small coverage (e.g. office, home) Low/no mobility High data-rate applications Ability to
802.11 Wireless LAN Protocol CS 571 Fall 2006. 2006 Kenneth L. Calvert All rights reserved
802.11 Wireless LAN Protocol CS 571 Fall 2006 2006 Kenneth L. Calvert All rights reserved Wireless Channel Considerations Stations may move Changing propagation delays, signal strengths, etc. "Non-transitive"
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Wireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
CS 336/536 Computer Network Security. Summer Term 2010. Wi-Fi Protected Access (WPA) compiled by Anthony Barnard
CS 336/536 Computer Network Security Summer Term 2010 Wi-Fi Protected Access (WPA) compiled by Anthony Barnard 2 Wi-Fi Protected Access (WPA) These notes, intended to follow the previous handout IEEE802.11
Wireless Sniffing with Wireshark
ethereal_ch06.qxd 11/8/06 5:07 PM Page 1 Chapter 6 Wireless Sniffing with Wireshark Solutions in this chapter: Techniques for Effective Wireless Sniffing Understanding Wireless Card Operating Modes Configuring
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Journal of Mobile, Embedded and Distributed Systems, vol. I, no. 1, 2009 ISSN 2067 4074
Issues in WiFi Networks Nicolae TOMAI Faculty of Economic Informatics Department of IT&C Technologies Babes Bolyai Cluj-Napoca University, Romania [email protected] Abstract: The paper has four sections.
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Particularities of security design for wireless networks in small and medium business (SMB)
Revista Informatica Economică, nr. 4 (44)/2007 93 Particularities of security design for wireless networks in small and medium business (SMB) Nicolae TOMAI, Cluj-Napoca, Romania, [email protected]
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Supporting ZDOs with the XBee API
Supporting ZDOs with the XBee API The ZigBee Device Profile is a management and discovery service layer supported on all ZigBee devices. Like all other profiles, the ZigBee Device Profile defines a set
This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP
This chapter covers the following topics: Characteristics of roaming Layer 2 roaming Layer 3 roaming and an introduction to Mobile IP C H A P T E R 5 Mobility This book covers the major components of 802.11
USER GUIDE Cisco Small Business
USER GUIDE Cisco Small Business WBPN Wireless-N Bridge for Phone Adapters December 2011 Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries.
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
All You Wanted to Know About WiFi Rogue Access Points
All You Wanted to Know About WiFi Rogue Access Points A quick reference to Rogue AP security threat, Rogue AP detection and mitigation Gopinath K. N. Hemant Chaskar AirTight Networks www.airtightnetworks.com
Using Nessus to Detect Wireless Access Points. March 6, 2015 (Revision 4)
Using Nessus to Detect Wireless Access Points March 6, 2015 (Revision 4) Table of Contents Introduction... 3 Why Detect Wireless Access Points?... 3 Wireless Scanning for WAPs... 4 Detecting WAPs using
> Technical Configuration Guide for Microsoft Network Load Balancing. Ethernet Switch and Ethernet Routing Switch Engineering
Ethernet Switch and Ethernet Routing Switch Engineering > Technical Configuration Guide for Microsoft Network Load Balancing Enterprise Solutions Engineering Document Date: March 9, 2006 Document Version:
Product Introduction and Setup Examples. RS232 to WIFI Converter
Product Introduction and Setup Examples RS232 to WIFI Converter Part WF5000B U.S. Converters LLC page 1 of 12 Content Product Introduction. 3 AP and STA Modes. 3 Auto- Frequency Function. 3 Security..
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
Reducing MAC Layer Handoff Latency in IEEE 802.11 Wireless LANs
Reducing MAC Layer Handoff Latency in IEEE 80211 Wireless LANs Sangho Shin Andrea G Forte Columbia University {ss2020,andreaf}@cscolumbiaedu Anshuman Singh Rawat New York University asr245@nyuedu Henning
ITRAINONLINE MMTK WIRELESS CLIENT INSTALLATION HANDOUT
ITRAINONLINE MMTK WIRELESS CLIENT INSTALLATION HANDOUT Developed by: Tomas B. Krag (Linux) Bruno Roger, ESMT (Windows) Edited by: Alberto Escudero Pascual, IT +46 Table of Contents 1.
Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual
Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter
Application Protocols for TCP/IP Administration
Application Protocols for TCP/IP Administration BootP, TFTP, DHCP Agenda BootP TFTP DHCP BootP, TFTP, DHCP, v4.4 2 Page 60-1 BootP (RFC 951, 1542, 2132) BootP was developed to replace RARP capabilities
Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University
Potential Security Vulnerabilities of a Wireless Network Implementation in a Military Healthcare Environment Jason Meyer East Carolina University Abstract This paper will look into the regulations governing
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter
LevelOne User Manual WPC-0600 N_One Wireless CardBus Adapter V2.0.0-0712 Safety FCC WARNING This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to
Troubleshooting Wireless Clients Version 1.1
Troubleshooting Wireless Clients Version 1.1 Basic Connectivity Troubleshooting information in this section covers problems with basic wireless connectivity, such as inability to associate or inability
Useful CLI Commands. Contents. Enable Logging
Useful CLI Commands Contents Enable Logging... 1 Interface... 3 AP... 4 ARM... 9 User... 11 Client Troubleshooting Typical... 16 Radio Tests (rft)... 16 Windows Client data... 18 Enable Logging (Aruba3200)
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG ITMC TECH TIP ROB COONCE, MARCH 2008
INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ WWW.LIVINGSTONNJ.ORG What is wireless technology? ITMC TECH TIP ROB COONCE, MARCH 2008 In our world today, this may mean sitting down at a coffee
