Network security – what does arp spoofing mean for wireless?



So, if you haven’t already had enough cause to tighten your wireless security…. we’ve been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can “own” all traffic from you machine to the gateway. It doesn’t matter if you’re using wireless or wired for your machine. As a demonstration I connected my laptop to my wireless access point…..


It received an address in the same IP range as my wired machines. (We’ll say they’re all in the 192.168.100.* subnet.) Now the laptop is the ONLY wireless client, all others are wired. Conventional wisdom would be that ONLY the wireless data transmissions could be picked up (sniffed) by the laptop and without arp poisoning (spoofing) that’s true.

However, since the laptop is in the same subnet…. it can hijack traffic from the other machines to the gateway. Doing this I captured the “on the wire” connection between my server and the gateway (complete with mailserver addresses and logins/passwords), also I hijacked an https session on my desktop (accepted the fake certificate to test) and saw the username/password information as it transfered.

So, the bottom line is this. If anyone has easy access to your network, wired or wireless it would be trivial to capture most all of your network traffic, wired or wireless. Of course, this assumes that you’ve not taken some special measures.

What steps can be taken to have an open wireless access seperated from a safe network?

Related Posts

Blog Traffic Exchange Related Posts
  • Ping not working? try ARP I'll confess to having a lot to learn about IP ethernet networking. I feel pretty comfortable with basic TCP/IP (v4), the concept of UDP vs. TCP ports, ICMP pings, etc... but ARP is something that I haven't dabbled much with. It is, of course, a layer that TCP depends on.......
  • How to use wireless networking on a laptop This is one that I run into from time to time. Most laptops the last year or two (actually maybe a bit longer), have built in wireless networking. This is great and makes for easy access to wireless access points just about anywhere. In fact, most current operating systems (Windows......
  • Wireless ethernet security Flexbeta has an article giving a good primer on the different approaches to wireless security that are currently available and what seems to be on track for the next generation of wireless networking. One thing that is worth noting, if it's transmitted through the air it can be intercepted. Breaking......
Blog Traffic Exchange Related Websites
  • Why You Need a Good Home Security System There are many unexpected things which can happen these days. The world can seem pretty cruel at times. This is when you want to be able to come home and feel safe. After all, your home is a place where you want to be able to feel your best......
  • How to Install a Home Security System: Most Common Pitfalls Installing a home security system might seem easy. To be sure, it’s a lot easier to install one today than it was just a decade ago. Inexpensive consumer electronics components combined with robust wireless technology means that even an amateur can put in a decent system. Just because it’s easy,......
  • Lorex Security Solutions LOREX is a global leader in video security camera solutions offering exceptional performance with a wide range of products including security cameras, wireless security cameras, ip cameras (network security cameras), security dvrs, observation systems and other complete security systems. LOREX solutions are easy to setup and features plug and......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site