Previous Section  < Day Day Up >  Next Section

6 Wireless penetration testing procedure

Maximum network discovery and fingerprinting distance with:

Built-in client card antenna

___

12 dBi omnidirectional

___

15 dBi Yagi

___

19 dBi directional

___

ESSID security

default

company name

closed

address

other relevant information

______________________________

Bypassing closed ESSID

closed ESSID value

______________________________

Bypassing MAC filtering

success with MAC

______________________________

Cracking WEP keys

key 1

______________________________

key 2

______________________________

key 3

______________________________

key 4

______________________________

cracking time

___

cracking tool

___

WEP cracking acceleration

time saved

___

traffic injection tool

___

type of traffic injected

___

Brute-forcing 802.1x access

password guessed

______________________________

Other 802.1x attacks

Comments

______________________________

Wireless man-in-the-middle attacks

  

Tool _________________

layer 1 attack (comments)

______________________________

layer 2 attack (comments)

______________________________

DoS attack resilience / detection (comments)

 

deauthentication flood

______________________________

    

deassociation flood

______________________________

    

malformed frames flood

______________________________

    

excessive beacon flood

______________________________

    

authentication flood

______________________________

    

probe requests flood

______________________________

    

Other attacks

______________________________

    

Wireless traffic interception / analysis

    

packets per minute

___

    

plaintext and plaintext authentication protocols detected

    

POP3

Telnet

    

SMTP

FTP

    

IMAP

HTTP

    

NNTP

Instant messengers

    

IRC

SQL

    

PAP

LDAP

    

Other

______________________________

    

passwords/user credentials collected

    

username/password

______________________________

    

username/password

______________________________

    

username/password

______________________________

    

username/password

______________________________

    

weak encryption/vulnerable protocols detected

    

LM/ NTLMv1

SSHv1

    

Other

______________________________

    

passwords cracked

    

username/password

______________________________

    

username/password

______________________________

    

username/password

______________________________

    

username/password

______________________________

    

UNIX remote services

___

type

___

SMB shares on WLAN

______________________________

NFS shares detected

______________________________

DHCP traffic detected

______________________________

HSRP/VRRP traffic detected

______________________________

HSRP password

______________________________

VRRP authentication

______________________________

VRRP password

______________________________

CDP traffic detected

______________________________

CDP data gathered

______________________________

ICMP type 9/10 implementation

RIPv1 running

Unauthenticated routing protocols over wireless network

RIPv2

OSPF

IGRP

EIGRP

IS-IS

IPX RIP

NLSP

Other ________________

 

Unauthenticated NTP traffic

SNMP traffic

SNMP communities found

___

SNMP version

___

NetBIOS over IPX traffic

AppleTalk traffic

DecNet traffic

Banyan Vines traffic

SNA traffic

Other ________________

Remote administration traffic

   

VNC

PCAnywhere

Webmin

Other ________________

Remote X Server cookies

    

Syslog traffic

over UDP

    

over TCP

Passive OS fingerprinting

_________________________________

      

Gateway discovery (IP)

_________________________________

      

IDS host discovery

_________________________________

      

ARP spoofing man-in-the-middle attack

_________________________________

      

Switch CAM table flooding

_________________________________

      

Route injection attacks

_________________________________

      

ICMP route redirection

_________________________________

      

DNS cache poisoning

_________________________________

      

DHCP DoS attacks

_________________________________

     

Tunneling protocols attack

_________________________________

     

VPN enumeration

_________________________________

     

VPN-related attacks

_________________________________

      

Active OS fingerprinting

_________________________________

      

Discovered backdoors / backchannel traffic

_________________________________

      

Banner grabbing and host penetration—penetrated hosts ()

      

IP/hostname:vulnerability

_________________________________

      

IP/hostname:vulnerability

_________________________________

      

IP/hostname:vulnerability

_________________________________

      

Network / host DoS resilience testing

      

attack/host/result

_________________________________

      

attack/host/result

_________________________________

      

attack/host/result

_________________________________

      

Egress filtering firewall testing from the wireless site

_________________________________

      

Physical security issues discovered

_________________________________

      

Social engineering attacks

_________________________________

      


    Previous Section  < Day Day Up >  Next Section