Network security – what does arp spoofing mean for wireless?



So, if you haven’t already had enough cause to tighten your wireless security…. we’ve been talking about arp poisoning (spoofing) and the basic conclusion is that IF an attacking machine is on the same subnet as your machine (same IP address range), they can “own” all traffic from you machine to the gateway. It doesn’t matter if you’re using wireless or wired for your machine. As a demonstration I connected my laptop to my wireless access point…..


It received an address in the same IP range as my wired machines. (We’ll say they’re all in the 192.168.100.* subnet.) Now the laptop is the ONLY wireless client, all others are wired. Conventional wisdom would be that ONLY the wireless data transmissions could be picked up (sniffed) by the laptop and without arp poisoning (spoofing) that’s true.

However, since the laptop is in the same subnet…. it can hijack traffic from the other machines to the gateway. Doing this I captured the “on the wire” connection between my server and the gateway (complete with mailserver addresses and logins/passwords), also I hijacked an https session on my desktop (accepted the fake certificate to test) and saw the username/password information as it transfered.

So, the bottom line is this. If anyone has easy access to your network, wired or wireless it would be trivial to capture most all of your network traffic, wired or wireless. Of course, this assumes that you’ve not taken some special measures.

What steps can be taken to have an open wireless access seperated from a safe network?

Related Posts

Blog Traffic Exchange Related Posts
  • Ping not working? try ARP I'll confess to having a lot to learn about IP ethernet networking. I feel pretty comfortable with basic TCP/IP (v4), the concept of UDP vs. TCP ports, ICMP pings, etc... but ARP is something that I haven't dabbled much with. It is, of course, a layer that TCP depends on.......
  • What a week.... I think it's time to pass along a long story of what's gone on over the last week or so here and some of the reasons there hasn't been anything posted. Generally, I would say that work has been busy, but something happened last week that went a bit beyond......
  • Network Security - Arp spoofing series I think I've wrapped up the series on arp spoofing and it's implications for network security. I know there's nothing earth shattering here, most network security types are well aware of the problems (and perhaps aware of more sophisticated solutions?). For some though, this series is likely an eye opener......
Blog Traffic Exchange Related Websites
  • Wireless Broadband Internet-whether It Is LAN Or WAN Service-is Associated Having A Wireless broadband Internet-whether it is LAN or WAN service-is associated having a number of diverse myths. These typically center on security and need to do with anxiety about how info is transmitted over a wireless connection and, furthermore, need to do with concerns about eavesdropping, in several cases. You will......
  • Lorex Security Solutions LOREX is a global leader in video security camera solutions offering exceptional performance with a wide range of products including security cameras, wireless security cameras, ip cameras (network security cameras), security dvrs, observation systems and other complete security systems. LOREX solutions are easy to setup and features plug and......
  • Internal IT Security Threat Internal users continue to be the torn in system and security administrator's side. This is the case for many reasons. One, they have knowledge of the networking recourses. Two, they have credentials to access various systems on the network and third, most security controls defend against external entities as compared......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site