Penetration Testing mailing list archives
RE: Wireless Audit Reports
From: "Michael Scheidell" <scheidell () secnap net>
Date: Thu, 30 Mar 2006 07:15:51 -0500
-----Original Message----- From: Matthew Webster [mailto:awakenings () mindspring com] Sent: Wednesday, March 29, 2006 9:47 AM To: pen-test () securityfocus com Subject: Wireless Audit Reports collection. In this case, I am trying to prove a negative. I can list networks, signal strengths, etc. but I feel like I am fluffing the report with meaningless and time wasting statistics. Does anyone have any experience in what they would report under these circumstances?
You could report open networks, and laptops with peer connections. The risk an open network poses is a user hoping on and bypassing the corporate firewall, or worse, bridging the internal protected network on a nic card with the external, unprotected network. For laptops, or 'probes', someone on the outside cool put up a phony access point and allow a laptop to join it. Also, this usually indicates an access point at home. If these users have access points at home, and use their corporate laptop to access it, there could be a third angle of attack and exposure to corporate data, either stored on the laptop, or maybe accessed via home to corporate lan (through the wireless access point at home) ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Wireless Audit Reports Matthew Webster (Mar 29)
- Re: Wireless Audit Reports David M. Zendzian (Mar 30)
- Re: Wireless Audit Reports Kyle Maxwell (Mar 30)
- Re: Wireless Audit Reports Maudite MLRL (Mar 30)
- Re: Wireless Audit Reports steven (Mar 31)
- <Possible follow-ups>
- Re: Wireless Audit Reports Matthew Webster (Mar 30)
- RE: Wireless Audit Reports Michael Scheidell (Mar 30)
- Re: Wireless Audit Reports Matthew Webster (Mar 30)
- RE: Wireless Audit Reports Jeff Gercken (Mar 30)
- tcpdump reconstructor Ghirai (Mar 31)
- Re: tcpdump reconstructor Andres Riancho (Mar 31)
- Re: tcpdump reconstructor Jason (Mar 31)
- Re: tcpdump reconstructor Nikhil Mulley (Mar 31)
- tcpdump reconstructor Ghirai (Mar 31)
- RE: Wireless Audit Reports Hayes, Ian (Mar 30)
- RE: Wireless Audit Reports Shenk, Jerry A (Mar 31)