25 December 2011

Probing and Network Discovery

Before an attacker is able to attempt any kind of wireless mischief, one of the first activities  would  be  for  him  is to  identify  the  various  wireless  targets  in  range. Probing  and  network  discovery  type  attacks are amongst the first activities engaged by any attacker.

There are primarily 2 main types of probing, active and passive probing. Active probing  involves  the  attacker  actively  sending  probe  requests  with  no  SSID configured (very much like a normal wireless client would do) in order to solicit a probe  response  with SSID information  and  other information from  any  access points in range. Active probing cannot detect for access points that are cloaked (configured not to respond to probe requests with no SSID set) or out of range of the attacker’s wireless transmission range.

When an attacker engages in passive probing, he is listening on all channels for all wireless packets send and receive without sending even a single packet, thus the detection capability is not limited by his transmission power. But, cloaked Aps with no wireless activities during the period of the probe would not be detected.

A good example of a tool that uses active probing is NetStumbler. Kismet on the other hand is an example of a passive probing tool.

NetStumbler

Kismet


reference:
- Christopher Low, 13 April 2005, Understanding Wireless Attacks and Detection, SANS Institute InfoSec Reading Room 
-   Craik, Mike.”All Your 802.11b Are Belong To Us (NetstumblerSignature).”.Kismet Forum. 13 Apr.2005.: http://www.kismetwireless.net/cgibin/ezmlm-cgi?mss:366:eafojgdoalggkiopbclf

0 comments:

Post a Comment