Penetration Testing mailing list archives
RE: Wireless Audit Reports
From: "Hayes, Ian" <Ian.Hayes () wynnlasvegas com>
Date: Thu, 30 Mar 2006 08:14:00 -0800
-----Original Message----- From: Matthew Webster [mailto:awakenings () mindspring com] Sent: Wednesday, March 29, 2006 6:47 AM To: pen-test () securityfocus com Subject: Wireless Audit Reports Hi, I work in an environment that has a policy that does not permit wireless devices. We still do an "audit" of the area to ensure that there are no wireless devices in our area. I wish to prove that there are no devices. Being in a city, there are literally hundreds of wireless networks present - perhaps up to 50 in any one given area of our building. I have tracked the signals down and have determined
that
there are no rogue access points or peer networks hidden in our
portion
of the building. Now a traditional wireless audit would be easy. I could report the signal strengths of our devices, if the SSID's are correct, are non-broadcast, etc. That would be an easy report to create after data collection. In this case, I am trying to prove a negative. I can
list
networks, signal strengths, etc. but I feel like I am fluffing the report with meaningless and time wasting statistics. Does anyone have any experience in what they would report under these circumstances?
Being on the Las Vegas Strip crowded with a bunch of other casinos, shops, malls, Starbucks, and everything else, the wireless spectrum over here is pretty crowded and we get a fair amount of bleed into our property. Having had to do something like this before, I went with the "traditional" type of report like you detailed, listing all detected networks, SSIDs, channels, encryption enabled, etc... but from a different slant. The purpose was twofold- one was to show how much signal was invading our airspace and how strong it was. Since everyone around here is WiFi crazy, the airspace is heavily polluted in some areas with a lot of signal overlap especially with some of these people slapping amps and huge antennas on their APs to compensate for loss of signal (you would be surprised how far away you can pick up some properties' signals even without Yagis or anything special). Second (more important) was to show the number, if any, of networks that bled into here that were open or insecure. We don't want any of our devices accidentally associating themselves with those networks, and want to make sure that those networks can't be used to hurt us. Ian Hayes | Senior Systems Engineer Wynn Las Vegas 3131 South Las Vegas Blvd, Las Vegas, NV 89109 Ph (702) 770-3252 | Cell (702) 266-6002 Ian.hayes () wynnlasvegas com ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Re: Wireless Audit Reports, (continued)
- Re: Wireless Audit Reports Maudite MLRL (Mar 30)
- Re: Wireless Audit Reports steven (Mar 31)
- Re: Wireless Audit Reports Matthew Webster (Mar 30)
- RE: Wireless Audit Reports Michael Scheidell (Mar 30)
- Re: Wireless Audit Reports Matthew Webster (Mar 30)
- RE: Wireless Audit Reports Jeff Gercken (Mar 30)
- tcpdump reconstructor Ghirai (Mar 31)
- Re: tcpdump reconstructor Andres Riancho (Mar 31)
- Re: tcpdump reconstructor Jason (Mar 31)
- Re: tcpdump reconstructor Nikhil Mulley (Mar 31)
- tcpdump reconstructor Ghirai (Mar 31)
- RE: Wireless Audit Reports Hayes, Ian (Mar 30)
- RE: Wireless Audit Reports Shenk, Jerry A (Mar 31)