Chapter 1 Wireless LAN Auditing Tools |
|
1 | (46) |
|
Wireless LAN Discovery Tools |
|
|
3 | (9) |
|
|
3 | (7) |
|
|
4 | (1) |
|
|
5 | (4) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Advanced Security Solutions |
|
|
11 | (1) |
|
|
12 | (1) |
|
Password Capture & Decrypt |
|
|
12 | (7) |
|
|
12 | (2) |
|
|
14 | (2) |
|
|
16 | (2) |
|
|
18 | (1) |
|
|
19 | (2) |
|
|
20 | (1) |
|
|
20 | (1) |
|
Network Management & Control |
|
|
21 | (2) |
|
|
23 | (1) |
|
Wireless Protocol Analyzers |
|
|
23 | (2) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (2) |
|
Antennas & Wireless LAN Equipment |
|
|
27 | (2) |
|
|
27 | (2) |
|
|
29 | (1) |
|
OS Fingerprinting & Port Scanning |
|
|
29 | (3) |
|
|
31 | (1) |
|
Application Layer Analyzers |
|
|
32 | (1) |
|
|
33 | (2) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
Operating System Exploit Tools |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
42 | (4) |
|
Answers to Review Questions |
|
|
46 | (1) |
Chapter 2 Gathering Information |
|
47 | (18) |
|
|
48 | (6) |
|
Publicly Available Information |
|
|
49 | (1) |
|
|
49 | (2) |
|
|
51 | (1) |
|
|
51 | (2) |
|
Connecting and Trace Routing |
|
|
52 | (1) |
|
|
53 | (1) |
|
Tools, Traffic, & Social Engineering |
|
|
54 | (5) |
|
|
55 | (2) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
60 | (1) |
|
|
61 | (2) |
|
Answers to Review Questions |
|
|
63 | (2) |
Chapter 3 Unauthorized Access |
|
65 | (18) |
|
|
67 | (3) |
|
|
67 | (2) |
|
|
67 | (1) |
|
|
68 | |
|
|
6 | (62) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
|
70 | (1) |
|
Data Theft & Malicious Insertion |
|
|
70 | (3) |
|
Illegal, Unethical, or Inappropriate Content |
|
|
71 | (1) |
|
|
71 | (2) |
|
|
73 | (1) |
|
|
74 | (3) |
|
|
74 | (1) |
|
|
74 | (1) |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (2) |
|
Answers to Review Questions |
|
|
81 | (2) |
Chapter 4 Denial of Service |
|
83 | (16) |
|
|
84 | (2) |
|
|
86 | (3) |
|
|
89 | (4) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
95 | (2) |
|
Answers to Review Questions |
|
|
97 | (2) |
Chapter 5 Legislation |
|
99 | (10) |
|
|
101 | (4) |
|
Identity Theft and Assumption Deterrence Act |
|
|
101 | (2) |
|
Computer Fraud and Abuse Act |
|
|
103 | (1) |
|
Electronic Communications Privacy Act |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
Chapter 6 General Policy |
|
109 | (32) |
|
|
112 | (1) |
|
|
113 | (3) |
|
|
114 | (2) |
|
|
115 | (1) |
|
|
115 | (1) |
|
|
116 | (7) |
|
|
117 | (1) |
|
Equipment Damage or Theft |
|
|
117 | (1) |
|
|
118 | (2) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
121 | (1) |
|
Personal Information Exposure |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
123 | (1) |
|
|
123 | (1) |
|
|
124 | (1) |
|
|
124 | (6) |
|
|
125 | (1) |
|
|
125 | (2) |
|
|
127 | (2) |
|
|
129 | (1) |
|
|
130 | (2) |
|
|
130 | (1) |
|
|
131 | (1) |
|
|
132 | (2) |
|
|
132 | (1) |
|
|
133 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (3) |
|
Answers to Review Questions |
|
|
139 | (2) |
Chapter 7 Functional Policy: Guidelines & Baselines |
|
141 | (38) |
|
|
142 | (6) |
|
|
142 | (2) |
|
|
142 | (1) |
|
Choosing a strong password |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
Implementation and Staging |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
147 | (1) |
|
|
148 | (3) |
|
|
148 | (1) |
|
Available Network Resources |
|
|
149 | (1) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (1) |
|
Spot-checks & Accountability |
|
|
150 | (1) |
|
|
151 | (21) |
|
|
151 | (2) |
|
|
153 | (4) |
|
|
157 | (1) |
|
Default Configuration Settings |
|
|
157 | (1) |
|
|
158 | (1) |
|
|
159 | (4) |
|
|
160 | (3) |
|
|
163 | (1) |
|
|
163 | (3) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
170 | (1) |
|
|
170 | (2) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (4) |
|
Answers to Review Questions |
|
|
178 | (1) |
Chapter 8 Functional Policy: Design & Implementation |
|
179 | (22) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
181 | (1) |
|
|
182 | (3) |
|
|
182 | (1) |
|
Layer 2 (Data-Link Layer) |
|
|
182 | (1) |
|
|
182 | (1) |
|
Layer 7 (Application Layer) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (5) |
|
|
186 | (4) |
|
Authentication & Encryption |
|
|
190 | (4) |
|
|
190 | (1) |
|
|
190 | (1) |
|
Scalability & Availability |
|
|
191 | (3) |
|
|
194 | (1) |
|
|
195 | (1) |
|
|
196 | (4) |
|
Answers to Review Questions |
|
|
200 | (1) |
Chapter 9 Functional Policy: Monitoring & Response |
|
201 | (16) |
|
|
202 | (3) |
|
Rogue Access Points & Ad Hoc Networks |
|
|
202 | (1) |
|
RF Jamming & Data Flooding |
|
|
203 | (2) |
|
|
203 | (2) |
|
|
205 | (1) |
|
|
205 | (3) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (2) |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (3) |
|
Answers to Review Questions |
|
|
216 | (1) |
Chapter 10 Encryption |
|
217 | (14) |
|
|
218 | (1) |
|
|
219 | (1) |
|
Data Encryption Standard (DES) |
|
|
220 | (1) |
|
|
221 | (2) |
|
Advanced Encryption Standard |
|
|
223 | (2) |
|
|
225 | (1) |
|
|
226 | (1) |
|
|
227 | (2) |
|
Answers to Review Questions |
|
|
229 | (2) |
Chapter 11 Data-Link Security Solutions |
|
231 | (48) |
|
|
232 | (1) |
|
Categories of Authentication & Encryption |
|
|
233 | (1) |
|
|
233 | (2) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (3) |
|
|
235 | (2) |
|
|
235 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (6) |
|
|
239 | (1) |
|
|
239 | (3) |
|
|
242 | (2) |
|
Maturity & Interoperability |
|
|
242 | (1) |
|
User-based Identification |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (27) |
|
|
244 | (3) |
|
|
247 | (1) |
|
|
248 | (18) |
|
|
249 | (1) |
|
|
250 | (5) |
|
EAP-Cisco Wireless (LEAP) |
|
|
255 | (2) |
|
EAP-TTLS (Tunneled Transport Layer Security) |
|
|
257 | (3) |
|
|
260 | (6) |
|
|
266 | (14) |
|
|
266 | (1) |
|
Dynamic Key Generation, Rotation, and Distribution |
|
|
267 | (1) |
|
Costs and Management Overhead |
|
|
267 | (1) |
|
Industry Acceptance, Standardization, and Support |
|
|
268 | (1) |
|
Availability and Implementation |
|
|
269 | (2) |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (4) |
|
Answers to Review Questions |
|
|
278 | (1) |
Chapter 12 802.11i & Wi-Fi Protected Access |
|
279 | (10) |
|
802.11i 280 Wi-Fi Protected Access (WPA) |
|
|
280 | (3) |
|
|
281 | (1) |
|
|
281 | (1) |
|
|
282 | (1) |
|
|
282 | (1) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (2) |
|
Answers to Review Questions |
|
|
287 | (2) |
Chapter 13 Wireless VPN Technology |
|
289 | (48) |
|
|
290 | (11) |
|
|
291 | (1) |
|
|
291 | (2) |
|
|
293 | (5) |
|
|
293 | (1) |
|
|
293 | (1) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
|
296 | (1) |
|
|
296 | (1) |
|
Role-based Access Control |
|
|
297 | (1) |
|
|
297 | (1) |
|
|
298 | (3) |
|
Remote Access Connections |
|
|
298 | (2) |
|
|
300 | (1) |
|
|
301 | (1) |
|
|
301 | (1) |
|
|
302 | (1) |
|
|
303 | (4) |
|
|
304 | (1) |
|
|
305 | (1) |
|
|
305 | (2) |
|
|
307 | (10) |
|
|
307 | (1) |
|
|
308 | (2) |
|
|
308 | (2) |
|
Encapsulating Security Payload |
|
|
310 | (1) |
|
|
310 | (2) |
|
|
312 | (1) |
|
Remote Access Differences |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (4) |
|
|
313 | (1) |
|
|
314 | (1) |
|
Using Digital Certificates |
|
|
315 | (1) |
|
Pre-Shared Key Authentication |
|
|
315 | (2) |
|
|
317 | (5) |
|
|
318 | (1) |
|
|
318 | (2) |
|
|
320 | (1) |
|
Public Key Authentication |
|
|
320 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
322 | (4) |
|
|
325 | (1) |
|
|
326 | (2) |
|
|
328 | (1) |
|
|
329 | (1) |
|
|
330 | (6) |
|
Answers to Review Questions |
|
|
336 | (1) |
Chapter 14 Segmentation Devices |
|
337 | (30) |
|
|
338 | (4) |
|
|
338 | (1) |
|
Network Address Translation |
|
|
339 | (2) |
|
|
341 | (1) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (1) |
|
|
344 | (2) |
|
Enterprise Encryption Gateways |
|
|
346 | (2) |
|
Enterprise Wireless Gateways |
|
|
348 | (8) |
|
|
349 | (1) |
|
|
350 | (1) |
|
VPN Concentrator Functionality |
|
|
351 | (1) |
|
Wireless-Oriented Features |
|
|
351 | (2) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
352 | (1) |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
354 | (2) |
|
|
356 | (1) |
|
|
357 | (1) |
|
|
358 | (2) |
|
Answers to Review Questions |
|
|
360 | (7) |
Chapter 15 Additional Security Solutions |
|
367 | (14) |
|
Intrusion Detection Systems |
|
|
362 | (6) |
|
|
364 | (3) |
|
Network-based vs. Host-based |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
Authenticated DHCP Services |
|
|
369 | (3) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (2) |
|
|
372 | (1) |
|
Baselining for Performance |
|
|
372 | (1) |
|
|
372 | (2) |
|
|
374 | (1) |
|
|
375 | (1) |
|
|
376 | (4) |
|
Answers to Review Questions |
|
|
380 | (1) |
Chapter 16 Wireless LAN Authentication |
|
381 | (52) |
|
|
382 | (19) |
|
Key Distribution Center (KDC) |
|
|
383 | (3) |
|
Authentication Service (AS) |
|
|
383 | (1) |
|
Ticket-Granting Service (TGS) |
|
|
383 | (1) |
|
Microsoft Kerberos Implementation |
|
|
384 | (1) |
|
Symbol Kerberos Appliance |
|
|
385 | (1) |
|
|
386 | (2) |
|
|
388 | (1) |
|
|
389 | (3) |
|
Kerberos Policy & Delegation |
|
|
392 | (3) |
|
|
395 | (5) |
|
Kerberos in a Wireless LAN Example |
|
|
396 | (3) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (16) |
|
|
402 | (7) |
|
|
403 | (1) |
|
|
403 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
Legacy Authentication Protocols |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (4) |
|
Authentication Design Considerations |
|
|
409 | (8) |
|
1. Single Site Deployment |
|
|
409 | (2) |
|
2. Distributed Autonomous Sites |
|
|
411 | (2) |
|
3. Distributed Sites, Centralized Authentication & Security |
|
|
413 | (2) |
|
4. Distributes Sites & Security, Centralized Authentication |
|
|
415 | (2) |
|
5. Combined Architectures |
|
|
417 | (1) |
|
|
417 | (6) |
|
LDAP applications and use |
|
|
418 | (1) |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
421 | (1) |
|
The Role of LDAP in Wireless LAN Security |
|
|
422 | (1) |
|
Multi-factor Authentication |
|
|
423 | (3) |
|
|
424 | (10) |
|
|
424 | (1) |
|
|
425 | (1) |
|
|
426 | (1) |
|
|
427 | (1) |
|
|
428 | (3) |
|
Answers to Review Questions |
|
|
431 | (2) |
Appendix A Wireless LAN Security Policy |
|
433 | (16) |
|
|
434 | (5) |
|
|
434 | (1) |
|
|
434 | (1) |
|
|
435 | (1) |
|
Violation reporting procedures and enforcement |
|
|
435 | (1) |
|
|
435 | (4) |
|
|
435 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
436 | (1) |
|
|
437 | (1) |
|
|
437 | (2) |
|
Functional Policy-Guidelines and Baselines |
|
|
439 | (4) |
|
|
439 | (2) |
|
Policy Change Control and Review |
|
|
439 | (1) |
|
|
439 | (1) |
|
Networking Staff and End User Employee Training Requirements |
|
|
440 | (1) |
|
Non-Employee Wireless Access |
|
|
440 | (1) |
|
|
440 | (1) |
|
Staging, Implementation, and Management Procedures |
|
|
440 | (1) |
|
|
441 | (1) |
|
|
441 | (1) |
|
|
441 | (1) |
|
Available Network Resources |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
Spot-checks & Accountability |
|
|
442 | (1) |
|
|
442 | (1) |
|
Functional Policy-Design and Implementation |
|
|
443 | (2) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
Authentication & Encryption |
|
|
444 | (1) |
|
|
444 | (1) |
|
|
444 | (1) |
|
Scalability & Availability |
|
|
444 | (1) |
|
|
445 | (1) |
|
Functional Policy-Monitoring and Response |
|
|
445 | (3) |
|
|
445 | (1) |
|
Rogue Access Points & Ad Hoc Networks |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
446 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
447 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
|
|
448 | (1) |
Appendix B Computer Fraud & Abuse Act |
|
449 | (8) |
Appendix C Electronic Communications Privacy Act-Chapter 119 |
|
457 | (10) |
Appendix D Electronic Communications Privacy Act-Chapter 121 |
|
467 | (18) |
Glossary |
|
485 | |