Passive Monitoring – wireless networks are intentionally designed to propagate data throughout buildings and areas, almost always resulting in the radio signals traveling beyond the limits of the area. By default, wireless devices are configured for maximum transmit (Tx) power on the wireless radio configuration. This will allow an eavesdropper, hacker, or intruder an opportunity to passively retrieve data without being noticed by network management personnel.
Unauthorized Access – If a person can connect …show more content…
A simple TCP port scanner will tell an intruder many things about vulnerabilities within the network. A hacker can take advantage of an open port’s utilities to directly access sensitive information or even reconfigure the network in a nefarious manner to allow easier access. One common way of accessing a wireless LAN unauthorized is to stage a Man-in-the-middle attack. One way to do this is to exploit the TCP/IP Address Resolution Protocol (ARP) functions. ARP is what a wireless station (access point, laptop, etc) uses to discover the physical address (MAC) of a destination wireless station. The MAC is embedded in networking devices from the manufacturer and is the de facto physical address or identifier of networking devices, same as the mailing address of a person’s home. The software sending data to a destination will have the destination IP address, but the sending station’s wireless radio must use ARP to discover the physical address (MAC) tied to the virtual address (IP address.) An ARP request packet is broadcast to all network devices announcing the destination’s IP address that is being sought. All stations within “hearing” range