Penetration Testing mailing list archives

Re: Wireless pen-test Cisco WPAv1 with PEAP and client side cert verification


From: DaKahuna <da.kahuna () gmail com>
Date: Thu, 22 May 2008 20:43:22 -0400


On May 20, 2008, at 5:33 PM, infoget () cnrconsulting bz wrote:

I was wondering if someone suggest areas for me to research what I might do to see how vulnerable my wireless deployment might be. Basic environment is:


Cisco SWAN with WLSM... guest access vlan and employee vlan... for the later we use WPAv1 with EAP/PEAP,etc. We use validation against Radius and we force the client to verify the digital certificate.


The only areas I think I might be vulnerable would be the management frames and the client driver.


But I would like anyones recommendation on how I can test my solution to make sure it is secure.

Have you tried any of the traditional VLAN attacks from your guest wireless against the Ethernet switch and use means to gain access to internal resources? The employee wireless seems pretty solid, especially given Radius being used for authentication.




------------------------------------------------------------------------
This list is sponsored by: Cenzic

Top 5 Common Mistakes in Securing Web Applications Find out now! Get Webinar Recording and PPT Slides

www.cenzic.com/landing/securityfocus/hackinar
------------------------------------------------------------------------


Current thread: