From: Hayes, Ian (Ian.Hayes@wynnlasvegas.com)
Date: Thu Mar 30 2006 - 11:14:00 EST
> -----Original Message-----
> From: Matthew Webster [mailto:awakenings@mindspring.com]
> Sent: Wednesday, March 29, 2006 6:47 AM
> To: pen-test@securityfocus.com
> Subject: Wireless Audit Reports
>
> Hi,
>
> I work in an environment that has a policy that does not permit
> wireless devices. We still do an "audit" of the area to ensure that
> there are no wireless devices in our area. I wish to prove that there
> are no devices. Being in a city, there are literally hundreds of
> wireless networks present - perhaps up to 50 in any one given area of
> our building. I have tracked the signals down and have determined
that
> there are no rogue access points or peer networks hidden in our
portion
> of the building.
>
> Now a traditional wireless audit would be easy. I could report
> the signal strengths of our devices, if the SSID's are correct, are
> non-broadcast, etc. That would be an easy report to create after data
> collection. In this case, I am trying to prove a negative. I can
list
> networks, signal strengths, etc. but I feel like I am fluffing the
> report with meaningless and time wasting statistics. Does anyone have
> any experience in what they would report under these circumstances?
Being on the Las Vegas Strip crowded with a bunch of other casinos,
shops, malls, Starbucks, and everything else, the wireless spectrum over
here is pretty crowded and we get a fair amount of bleed into our
property. Having had to do something like this before, I went with the
"traditional" type of report like you detailed, listing all detected
networks, SSIDs, channels, encryption enabled, etc... but from a
different slant. The purpose was twofold- one was to show how much
signal was invading our airspace and how strong it was. Since everyone
around here is WiFi crazy, the airspace is heavily polluted in some
areas with a lot of signal overlap especially with some of these people
slapping amps and huge antennas on their APs to compensate for loss of
signal (you would be surprised how far away you can pick up some
properties' signals even without Yagis or anything special). Second
(more important) was to show the number, if any, of networks that bled
into here that were open or insecure. We don't want any of our devices
accidentally associating themselves with those networks, and want to
make sure that those networks can't be used to hurt us.
Ian Hayes | Senior Systems Engineer
Wynn Las Vegas
3131 South Las Vegas Blvd, Las Vegas, NV 89109
Ph (702) 770-3252 | Cell (702) 266-6002
Ian.hayes@wynnlasvegas.com
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:46 EDT