Can someone send Manolo a study group invite, please? [email protected]
2010/10/17 Kristján Ólafur Eðvarðsson <[email protected]> > That is very good. > > > > I investigated further and I only found this: > > > > http://www.dba-oracle.com/t_unauthorized_access_computer_network_crime.htm > > > > *Evil-twins and honey pots* > > I learned about how hackers work by planting “honey pots”, internet-enabled > computers with loose security. I kick-back, look-over the crooks shoulder > and observe their behavior. In one case, a hacker from China upgraded my > version of Linux! *The wi-fi equivalent of a honey pot is the “evil twin” > attack. * > > *“A more recent threat to emerge is the "evil twin" attack. A person with > a wireless-equipped laptop can show up at, say, a coffee shop or airport and > overpower the local Wi-Fi hotspot. The person then eavesdrops on > unsuspecting computer users who connect to the bogus network.* > > *At a technology conference in London this spring, hackers set up evil > twins that infected other computers with viruses, some that gather > information on the user, the Wall Street Journal reported.”* > > > > and this: > > > > > http://www.cisco.com/en/US/docs/solutions/Enterprise/Mobility/secwlandg20/sec_wireless_overview.html#wp877732 > > > > Wireless, due its over the air transmission, has unique security > requirements. The primary security concerns for a wireless network are: > > •[image: http://www.cisco.com/en/US/i/templates/blank.gif]Rogue access > points and clients that can create backdoor access to the company's network. > > > •[image: http://www.cisco.com/en/US/i/templates/blank.gif]Hacker access > points, such as *evil twins and honeypots*, that try to lure your users > into connecting to them for purposes of network profiling or stealing > proprietary information. > > •[image: http://www.cisco.com/en/US/i/templates/blank.gif]Denial of > service that disrupts or disables the wireless network. > > •[image: http://www.cisco.com/en/US/i/templates/blank.gif]Over the air > network reconnaissance, eavesdropping, and traffic cracking. This is now > primarily a legacy issue as the wireless industry has done a good job > creating standard approaches to user authentication and traffic encryption > via 802.11i and WPA. > > •[image: http://www.cisco.com/en/US/i/templates/blank.gif]Controlling the > networks wireless users connect to, especially when they are outside of the > office. > > •[image: http://www.cisco.com/en/US/i/templates/blank.gif]Wireless > security for guest users. > > So perhaps it is a question of finding the „Cisco answer“ to the question. > Evil twin i for example not found in the WCS help (but honey pot is). So I > would probably bet that honey pot would be more accurate. > > Those 2 are often mentioned in the same sentence and they probably mean the > same in my mind. > > But since this is a open ended question, you might use both phrases to show > that you know what you are talking about. > > regards. Kristjan > > > > *From:* Kelvin Dam [mailto:[email protected]] > *Sent:* 17. október 2010 15:19 > *To:* Kristján Ólafur Eðvarðsson > *Cc:* [email protected] > *Subject:* Re: [CCIE Wireless] 1. OEQ Answers (second) > > > > Im may very well be way off here, but Im not convinced that the definition > of "honeypot" you posted is correct. > > > > I believe that a Evil Twin is an AccessPoint, broadcasting the same SSID > as a corporation for instance, trying to lure users to use it. > > > > A HoneyPot is more or less the same, but doesnt have to be the same SSID, > and also used by admins to lure attackers into a confined subnet to > > be monitored. > > > > Im basing my assumptions on these : > > > > Evil Twin > > The attacker uses a bogus base > station<http://en.wikipedia.org/wiki/Base_station>that someone connects to > using > Wi-Fi <http://en.wikipedia.org/wiki/Wi-Fi> wireless technology. By > imitating the name of another, legitimate wireless provider, they can fool > people into trusting the internet services that they are providing. When the > users log into bank or e-mail <http://en.wikipedia.org/wiki/E-mail>accounts, > the phishers have access to the entire transaction, since it is > sent through their equipment. > > Unwitting web <http://en.wikipedia.org/wiki/World_Wide_Web> users are > invited to log into the attacker's > server<http://en.wikipedia.org/wiki/Server_(computing)>with bogus login > prompts, tempting them to give away sensitive information > such as usernames <http://en.wikipedia.org/wiki/Username> and > passwords<http://en.wikipedia.org/wiki/Password>. > Often users are unaware they have been duped until well after the incident > has occurred. > > Users think they have logged on to a wireless hotspot connection when in > fact they have been tricked into connecting to the attacker's base station. > The hacker jams the connection to the legitimate base station by sending a > stronger signal within proximity to the wireless client - thereby turning > itself into an 'evil twin.' > > A rogue Wi-Fi connection can be set up on a laptop with a bit of simple > programming and wireless card that acts as an access point. The access > points are hard to trace, since they can suddenly be shut off, and are easy > to build. A hacker can make their own wireless networks that appear to be > legitimate by simply giving their access point a similar name to the Wi-Fi > network on the premises. Since the hacker may be physically closer to the > victim than the real access point, their signal will be stronger, > potentially drawing more victims. The hacker's computer can be configured to > pass the person through to the legitimate access point while monitoring the > traffic of the victim, or it can simply say the system is temporarily > unavailable after obtaining a user id and > password.[3]<http://en.wikipedia.org/wiki/Evil_twin_(wireless_networks)#cite_note-2> > > > > *HoneyPots* > > A honeypot is valuable as a surveillance and early-warning tool. While it > is often a computer, a honeypot can take other forms, such as files or data > records, or even unused IP > address<http://en.wikipedia.org/wiki/IP_address>space. A honeypot that > masquerades as an open > proxy <http://en.wikipedia.org/wiki/Open_proxy> to monitor and record > those using the system is a sugarcane. Honeypots should have no production > value, and hence should not see any legitimate traffic or activity. Whatever > they capture is therefore malicious or unauthorized. One practical > application of this is a honeypot that thwarts > spam<http://en.wikipedia.org/wiki/Spam_(electronic)>by masquerading as a type > of system abused by spammers. These honeypots > categorize trapped material 100% accurately: it is all illicit. > > Honeypots can carry risks to a network, and must be handled with care. If > they are not properly walled off, an attacker can use them to break into a > system. > > *Victim hosts <http://en.wikipedia.org/wiki/Host_(network)>* are an active > network counter-intrusion tool. These computers run special software, > designed to appear to an intruder as being important and worth looking into. > In reality, these programs are dummies, and their patterns are constructed > specifically to foster interest in attackers. The software installed on, and > run by, victim hosts is dual purpose. First, these dummy programs keep a > network intruder occupied looking for valuable information where none > exists, effectively convincing him or her to isolate themselves in what is > truly an unimportant part of the network. This decoy strategy is designed to > keep an intruder from getting bored and heading into truly security-critical > systems. The second part of the victim host strategy is intelligence > gathering. Once an intruder has broken into the victim host, the machine or > a network administrator can examine the intrusion methods used by the > intruder. This intelligence can be used to build specific countermeasures to > intrusion techniques, making truly important systems on the network less > vulnerable to intrusion. > > > Any takers on this? :) > > > > Kelvin > > 2010/10/15 Kristján Ólafur Eðvarðsson <[email protected]> > > Hi Kelvin, > > That OEQ was rather good. I gave it some thought and scrolled through > the help of my WCS server. Which in fact is very good and explains a lot of > things. > > It is a rouge AP so It cant be a friendly based on that fact. Malicious is > the same thing > basically as a rouge. So they are probably looking for a classification of > that rouge. > > I first read through the classifications of rouges and didn't see a clear > answer to that questions > but for everyone I like to share this info. > > "Rogue Access Point Classification Types > Rogue access points classification types include: > > Malicious-Detected but untrusted or unknown access points with a malicious > intent within the system. They also refer to access points that fit the > user-defined malicious rules or have been manually moved from the friendly > access point classification. See "Malicious Rogue APs" for more information. > Friendly-Known, acknowledged, or trusted access points. They also refer to > access points that fit the user-defined friendly rogue access point rules. > Friendly rogue access points cannot be contained. See "Friendly Rogue APs" > for more information. For more information on configuring friendly access > point rules, see "Configuring Friendly AP Controller Templates". > Unclassified-Rogue access point that are not classified as either malicious > or friendly. These access points can be contained and can be moved manually > to the friendly rogue access point list. See for more information. See > "Unclassified Rogue APs" for more information." > > However when I was reading this I just remembered that I have sometimes got > this warning in WCS > in real setups. "With Honey pot AP detected" > > And this seems to best answer to this question. Do you guys agree ? > > > "Honey Pot AP Detected > Alarm Description and Possible Causes > The addition of WLANs in the corporate environment introduces a whole new > class of threats for network security. RF signals that penetrate walls and > extend beyond intended boundaries can expose the network to unauthorized > users. A rogue access point can put the entire corporate network at risk for > outside penetration and attack. Not to understate the threat of the rogue > access point, there are many other wireless security risks and intrusions > such as mis-configured access points, unconfigured access points, and DoS > (denial-of-service) attacks. > > One of the most effective attacks facing enterprise networks implementing > wireless is the use of a "honey pot" access point. An intruder uses tools > such as NetStumbler, Wellenreiter, and MiniStumbler to discover the SSID of > the corporate access point. Then the intruder sets up an access point > outside the building premises or, if possible, within the premises and > broadcasts the discovered corporate SSID. An unsuspecting client then > connects to this "honey pot" access point with a higher signal strength. > When associated, the intruder performs attacks against the client station > because traffic is diverted through the "honey pot" access point. > > wIPS Solution > When a "honey pot" access point is identified and reported by the Cisco > Adaptive Wireless IPS, the WLAN administrator may use the integrated > over-the-air physical location capabilities, or trace device on the wired > network using rogue location discovery protocol (RLDP) or switchport tracing > to find the rogue device. " > > regards. Kristjan > > > > > ---------------------------------------------------------------------- > > Message: 1 > Date: Fri, 15 Oct 2010 08:24:00 +0200 > From: Kelvin Dam <[email protected]> > To: Stalder Dominic <[email protected]>, > [email protected] > Subject: Re: [CCIE Wireless] OEQ Answers (second) > Message-ID: > <[email protected]> > Content-Type: text/plain; charset="windows-1252" > > First question in that doc: > > *A rouge access point broadcasting a trusted SSID is called what? > > They are called ?Trusted APs? or ?Friendly APs?.* > > Is wrong I believe...A Rogue broadcasting a trusted SSID is a Evil Twin to > the best of my knowledge? > > Kelvin > > > 2010/10/13 Stalder Dominic <[email protected]> > > > And here with the small answer list ;-) > > _______________________________________________ > > For more information regarding industry leading CCIE Lab training, please > > visit www.ipexpert.com > > > > > > > -- > Kelvin Dam > -------------- next part -------------- > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > > > > -- > Kelvin Dam > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > -- George M. Stefanick Jr., CCNA, CWNA, CQS-CWLANSS Sr. Wireless Engineer (717) 471 - 6186 Mobile (717) 798 - 8255 Skype
<<image003.png>>
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
