Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
RE: [Full-Disclosure] follow up question...
From: Todd Towles (toddtowlesbrookshires.com)
Date: Fri Aug 06 2004 - 11:37:16 CDT
Preventing ARP poisoning is a very good security measure, but I am not sure
how they made it do it in this case.
If you don't know what ARP poisoning is and why it is dangerous, then google
An AP is basically a normal router but for wireless. ARP poisoning allows
for sniffing packets on switched network (not really important on the
wireless side, since you can sniff them out of the air) and is the start of
man-in-the-middle attacks most of the time.
[mailto:full-disclosure-adminlists.netsys.com] On Behalf Of kyle stapp
Sent: Friday, August 06, 2004 8:20 AM
Subject: [Full-Disclosure] follow up question...
Hey there everyone,
No answer to the question here...just another one.
I caught this and got thinking...I don't know near enough about wireless
systems so here's a question in addition to his. Does that really make it
more secure(prevent ARP poisoning). Doesn't that make it easier to
corrupt the network? How hard would it be to assume the identity of the AP?
What happens if two AP's with the same IP and MAC attempt to get on the same
network? I been reading and heard a lot more about people infiltrating by
setting up their own rouge AP's. If I don't understand this right let me
I believe from what has been said that this system forces all comunication
to be sent to the AP and the AP handles routing it to the true destination.
Situation: Source want to send to Dest.
Source queries as in previous email...Source sends to DE:AD:CO:DE:CA:FE.
AP re-routes this to FE:EF:FA:CE:BE:EE.
----- Original Message -----
From: "Dan Taylor, Jr." <dan.taylor.jrgmail.com>
Sent: Thursday, August 05, 2004 11:15 PM
Subject: [Full-Disclosure] Static ARP Replies?
> I have encountered a few 802.11b public access points (I can't
> remember the vendors, but they were for hotels) that seem to have
> built-in ARP cache poisoning prevention. I found it nonetheless
> impressive and am looking for solutions to implement it (presumably
> with my own wireless card and hostap drivers).
> Here's what happens on one of these networks:
> Say the AP's MAC address is DE:AD:C0:DE:CA:FE, with the IP of
> 192.168.1/255.255.255.0, and I send out an ARP request for hosts
> Say my MAC address is FE:ED:FA:CE:BE:EF, with the IP address of
> --> ARP broadcast (source FE:ED:FA:CE:BE:EF destination FF:FF:FF:FF:FF:FF)
> --> Who has 192.168.1.2? Tell 192.168.1.100
> --< ARP Reply (source DE:AD:C0:DE:CA:FE, destination FE:ED:FA:CE:BE:EF)
> --< 192.168.1.2 is at DE:AD:C0:DE:CA:FE
> I'm assuming this is a rather effective way of not only preventing ARP
> poisoning attacks, but making it so that all communication is
> virtually done between the client and the access point).
> Has anyone seen this feature implemented in any other access points?
> To what extent does this work and/or it's behavior on layer-2
> broadcasting or client to client (mac address to mac address)
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
Full-Disclosure - We believe in it.