Wireless Intrusion Detection - Sharkfest - Wireshark

Wireless Intrusion Detection - Sharkfest - Wireshark Wireless Intrusion Detection - Sharkfest - Wireshark

sharkfest.wireshark.org
from sharkfest.wireshark.org More from this publisher
13.01.2015 Views

Application attacks • Border IDS can be placed where wireless bridges to wired network, treating wireless as a hostile external network • Overlay WIDS can feed data to traditional IDS • Kismet can feed Snort via virtual network interface (tun/tap in Linux) 58

How easy is it to perform attacks • Aircrack-NG + Linux • Wi-Fi Pineapple • PwnPad • PwnPlug • Metasploit + LORCON + Linux 59

Application attacks<br />

• Border IDS can be placed where wireless bridges to<br />

wired network, treating wireless as a hostile<br />

external network<br />

• Overlay WIDS can feed data to traditional IDS<br />

• Kismet can feed Snort via virtual network interface<br />

(tun/tap in Linux)<br />

58

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!