Appendix G
Wireless LAN Vulnerabilities Matrix
Complete the following matrix by filling in the blank boxes in the table.
Security protection
Brief description
Vulnerabilities
Prevention (if any)
MAC address filtering
Allow or deny access traffic from mac addresses
Allowed client station addresses can be spoofed by any old hacker. This method is unreliable at best
None really
Open system authentication (SSID beaconing)
Cloak the ssid so that no one will pick up your network while they are scanning. Basically implements a closed network
Mixed vendor incompatibilities, sometimes misconfigured ssids, 2 layer wireless protocol analyzers can lead to a revealing of the ssid
As above none effective enough to mention
WEP
Standard wireless network security that runs on matching wep keys for example. Transmisions are also encrypted ahead of time as privacy is priority here.
These days there exist tools that can crack this open in about 5 minutes rendering it less than efficient. They use a combination of weak key, reinjection and bit flipping attacks
Ccmp encryption and tkpi are recommended in this situation