Assume you are reviewing the security posture of a WLAN segm
Assume you are reviewing the security posture of a WLAN segment for the manufacturing shop floor at a factory. How would you identify rogue access points on the corporate network?
Solution
Please follow the data and description :
In the world of growing technology, regardless of the attacks and threats that are faced by the organisatiosn there are many new attacks being generated everyday daily. In general a rogue AP is a Wi-Fi Access Point that is set up by an attacker for the purpose of sniffing wireless network traffic in an effort to gain unauthorized access to victim\'s network.
But for the fortune there are a couple of ways of detecting rogue APs. One of the more popular and cost-effective techniques is to have a technician perform manual checks with a laptop or PDA running NetStumbler. It is a tool for detecting all the wireless networks within a broadcast or an preferred area. The easiest and the simpler way to trace down a rogue AP is to take a laptop that\'s running NetStumbler and walk in the direction that produces the greatest signal strength from the questionable access point. Then we soon can detect or come to a point that if the signal is coming from within the same building or from somewhere else apart from the place you are in. If the signal is coming from the user\'s building, then we can use the signal strength to narrow down the search to a single room. After that, just have to search around the room until we get to find the access point.
Every enterprise or an organisation with the implementation of the wireless network should have a wireless IDS/IPS system in the place. A wireless IDS/IPS is an Intrusion Detection/Intrusion Prevention System. A full featured IDS/IPS will detect and \"kill\" rogue APs, detect and stop denial-of-service attacks, man in the middle attacks and report on suspicious activity. But some of these methods can get a bit expensive, it\'s only achievable through the use of these techniques that will make it possible to shield your network from a potentially threat.
Hope this is helpful.
