Security Basics mailing list archives
Re: Network scanning
From: Sebastian Schneider <ses () straightliners de>
Date: Sun, 10 Aug 2003 20:15:52 +0200
On Sunday 10 August 2003 17:27, White-Tiger wrote:
Ok, I do not know about eapol for wireless products, just hardline. when you plug in your device, you won't be able to see any broadcasts until you go through the eapol process with the MAC of the NIC,
this is interesting, i havent worked on that issue before. How is that eapol working actually?
so if they have access to a PC, they can look at the pc MAC, then spoof it on the switch with their own device.
just if it allows booting from cd. usually i turn all that options off and restricting access to the bios as is. In case you're dealing with a thin-client booting from network i guess this method is getting even harder.
BUT if they already have access to a network PC, why don't they just boot from CD and load whatever CD os with there tools on it ! that way they don't have to worry about spoofing. I kinda thought this is what WEP was for?
WEP is an encryption option for 802.11a/b though its design is rather weak and can be cracked quite fast.
How about depending on os, the client side of wireless, had a cert file, that creates a VPN that all traffic gets sent through, Not impossible to sniff, but just would take them a while, depending how strong crypto you use.
in this case an simple IPSec AH in transport mode would do it, since it should be able to traverse NAT/PAT. but using certificates makes it hard to administrate though you could set up a CA.
--- Sebastian Schneider <ses () straightliners de> wrote:no problem ;-)I am sorry I got on this late... Some switches support eapol that works with a radius server to auth mac address atportlevel before the switch will enable that port... I have done limited testing. If you unplug a live connect,notonly will someone be calling saying that somethingdoesn'twork, but when they plug in there NIC the switch willsee anew MAC and disable the port. Some one can give some ideas about MAC spoofing, But doesn't the NIC give its real MAC to the switch whileyouare trying to spoof someone elses MAC?if someone is setting the card into listening mode, nobody will get any address (i haven't checked this one out yet)... and by analyzing broadcast traffic you might be able to get existing MACs on the network and spoof hosts easily. this is a big deal for wireless based communications On Saturday 09 August 2003 17:18, White-Tiger wrote:I am sorry I got on this late... Some switches support eapol that works with a radius server to auth mac address atportlevel before the switch will enable that port... I have done limited testing. If you unplug a live connect,notonly will someone be calling saying that somethingdoesn'twork, but when they plug in there NIC the switch willsee anew MAC and disable the port. Some one can give some ideas about MAC spoofing, But doesn't the NIC give its real MAC to the switch whileyouare trying to spoof someone elses MAC? if this is the case, then you can disable and port thatisnot a known MAC. I have a baystack450, and I can setup the MAC in eachofthe switchs, but that will be kinda hard to maintain.SoI am looking at free radius for OpenBSD that supports eapol, so I can just setup a file with all allowedMACs.Hope this helps, sorry if someone already said this, Iama little late on the thread. WT --- Sebastian Schneider <ses () straightliners de> wrote:On Friday 08 August 2003 14:19, CHRIS GRABENSTEINwrote:As far as the hard wires, I think the best solutionisto search out thoseunused ports and unplug them from the switch. Theycanbe quicklyreconnected if needed, and you'll know about it.I guess you're actually aware, that not everyone is locking up rooms containing switches. And just plugging out unused cables won't besufficient,since usually I just can plug out any computer and plug in my own.|-----Original Message----- |From: netsec novice [mailto:netsec9 () hotmail com] |Sent: Thursday, August 07, 2003 4:51 PM |To: security-basics () securityfocus com |Subject: Network scanning | | |Are there tools out there that would allow systemadministrators to be|notified when a new workstation attaches to anetwork?I'm|thinking both |wireless and ethernet in this case. SNMP maybe?I amin a|credit union |environment and my concern is that someone wouldbeable to steal an|existing jack or a jack that is not physicallyprotected but|live and be |able to capture traffic or do reconaissance. Wedon'thave|Wireless access |at this point but may look to it in the future.Myonly|thought in that |case would be to encrypt all traffic sincewirelesssecurity|is a bit scary |at this point. Any ideas?--------------------------------------------------------------------------- ------------------------------------------------------------------------------ ----------------------------- straightLiners IT Consulting & Services Sebastian Schneider Metzer Str. 12 13595 Berlin Germany Phone: +49-30-3510-6168 Fax: +49-30-3510-6169 Mail: ses () straightliners de Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte Informationen. Wenn Sie nicht der richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben, informieren Sie bitte sofort den Absender undvernichtenSie diese Mail. Das unerlaubte Kopieren sowie die unbefugteWeitergabedieser Mail ist nicht gestattet. This e-mail may contain confidential and/orprivilegedinformation. If you are not the intended recipient (or havereceivedthis e-mail in error) please notify the sender immediately and destroy this e-mail. Any unauthorized copying, disclosure or distribution of the material in thisis strictly forbidden.--------------------------------------------------------------------------- --------------------------------------------------------------------------- === message truncated === __________________________________ Do you Yahoo!? Yahoo! SiteBuilder - Free, easy-to-use web site design software http://sitebuilder.yahoo.com
-- straightLiners IT Consulting & Services Sebastian Schneider Metzer Str. 12 13595 Berlin Germany Phone: +49-30-3510-6168 Fax: +49-30-3510-6169 Mail: ses () straightliners de Diese E-Mail enthält vertrauliche und/oder rechtlich geschützte Informationen. Wenn Sie nicht der richtige Adressat sind oder diese E-Mail irrtümlich erhalten haben, informieren Sie bitte sofort den Absender und vernichten Sie diese Mail. Das unerlaubte Kopieren sowie die unbefugte Weitergabe dieser Mail ist nicht gestattet. This e-mail may contain confidential and/or privileged information. If you are not the intended recipient (or have received this e-mail in error) please notify the sender immediately and destroy this e-mail. Any unauthorized copying, disclosure or distribution of the material in this e-mail is strictly forbidden. --------------------------------------------------------------------------- ----------------------------------------------------------------------------
Current thread:
- RE: Network scanning, (continued)
- RE: Network scanning Jason Armstrong (Aug 08)
- RE: Network scanning CHRIS GRABENSTEIN (Aug 08)
- Re: Network scanning Sebastian Schneider (Aug 08)
- Re: Network scanning White-Tiger (Aug 11)
- Re: Network scanning Sebastian Schneider (Aug 11)
- RE: Network scanning Ethan (Aug 12)
- Re: Network scanning Jeff Lumley (Aug 12)
- Re: Network scanning Sebastian Schneider (Aug 08)
- Re: Network scanning Sebastian Schneider (Aug 11)
- Re: Network scanning Logan Rogers-Follis (Aug 14)