Network security – what does arp spoofing mean for wireless?



So, if you haven’t already had enough cause to tighten your wireless security…. we’ve been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can “own” all traffic from you machine to the gateway. It doesn’t matter if you’re using wireless or wired for your machine. As a demonstration I connected my laptop to my wireless access point…..


It received an address in the same IP range as my wired machines. (We’ll say they’re all in the 192.168.100.* subnet.) Now the laptop is the ONLY wireless client, all others are wired. Conventional wisdom would be that ONLY the wireless data transmissions could be picked up (sniffed) by the laptop and without arp poisoning (spoofing) that’s true.

However, since the laptop is in the same subnet…. it can hijack traffic from the other machines to the gateway. Doing this I captured the “on the wire” connection between my server and the gateway (complete with mailserver addresses and logins/passwords), also I hijacked an https session on my desktop (accepted the fake certificate to test) and saw the username/password information as it transfered.

So, the bottom line is this. If anyone has easy access to your network, wired or wireless it would be trivial to capture most all of your network traffic, wired or wireless. Of course, this assumes that you’ve not taken some special measures.

What steps can be taken to have an open wireless access seperated from a safe network?

Related Posts

Blog Traffic Exchange Related Posts
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
  • Windows Wireless vulnerability Brian Krebs has a post today on a Windows wireless networking "feature" which can be somewhat of a security risk. You see, it seems that With wireless networking enabled, Windows remembers the last wireless SSID that you connected to, so let's say you were at a public Wireless access point......
  • Wireless ethernet security Flexbeta has an article giving a good primer on the different approaches to wireless security that are currently available and what seems to be on track for the next generation of wireless networking. One thing that is worth noting, if it's transmitted through the air it can be intercepted. Breaking......
Blog Traffic Exchange Related Websites
  • Shopping for Your Next Wireless Security Camera System Wireless Security Camera System If you are looking for a new surveillance system for your home or office, there are a lot of products on the market that can get the job done. The trick is to find the one that will work best for your needs without breaking the......
  • Wireless Broadband Internet-whether It Is LAN Or WAN Service-is Associated Having A Wireless broadband Internet-whether it is LAN or WAN service-is associated having a number of diverse myths. These typically center on security and need to do with anxiety about how info is transmitted over a wireless connection and, furthermore, need to do with concerns about eavesdropping, in several cases. You will......
  • Network Webcams Network Webcams are "The IP Camera Specialists" selling, and supporting IP network cameras and security cameras to the U.S. market.¬†They offer customers free ground shipping, free technical support, as well as plug & play camera pre-configuration.¬† This site offers for sale many types of network cameras, security cameras and......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site