X-Account-Key: account1 X-UIDL: 46709 X-Mozilla-Keys: Return-Path: os2-wireless_users-owner@2rosenthals.com Received: from 192.168.100.5 (hawking [192.168.100.5]) by 2rosenthals.com (Hethmon Brothers Smtpd) id 20050207161424-20826-7 ; Mon, 07 Feb 2005 16:14:24 -0500 (Hethmon Brothers Smtpd) id 20050207161423-45725-7 ; Mon, 07 Feb 2005 16:14:23 -0500 Received: from mx1.mailhop.org ([63.208.196.170]) by mxout3.mailhop.org with esmtp (Exim 4.43) id 1CyGD8-0004Vp-Qg for os2-wireless_users@2rosenthals.com; Mon, 07 Feb 2005 16:14:23 -0500 Received: from mxout4.netvision.net.il ([194.90.9.27]) by mx1.mailhop.org with esmtp (Exim 4.42) id 1CyGD8-000Enf-GS for os2-wireless_users@2rosenthals.com; Mon, 07 Feb 2005 16:14:22 -0500 Received: from poblano ([217.132.166.238]) by mxout4.netvision.net.il (iPlanet Messaging Server 5.2 HotFix 2.02 (built Oct 21 2004)) with SMTP id <0IBK00L7N8B8O1@mxout4.netvision.net.il> for os2-wireless_users@2rosenthals.com; Mon, 07 Feb 2005 23:14:01 +0200 (IST) In-reply-to: <4207B2E8.2000502@2rosenthals.com> Message-id: <0IBK00L7O8B8O1@mxout4.netvision.net.il> MIME-version: 1.0 X-Mailer: The Polarbar Mailer; version=1.25a; build=1965 Content-type: TEXT/PLAIN Content-transfer-encoding: 7BIT X-Mailer-Platform: OS/2; architecture=x86; version=20.45 X-Mailer-Java-VM: IBM Corporation; version=JDK 1.1.8 IBM build o118-20010426 (JIT javax V3.5-IBMJDK1.1-20010426); compiler=javax References: <4207B2E8.2000502@2rosenthals.com> X-Mail-Handler: MailHop by DynDNS.org X-Spam-Score: -2.6 (--) Date: Mon, 07 Feb 2005 23:13:57 +0200 Sender: os2-wireless_users-owner X-Listname: os2-wireless_users@2rosenthals.com Reply-To: os2-wireless_users@2rosenthals.com From: Stan Goodman To: os2-wireless_users@2rosenthals.com Subject: [OS2Wireless] CWNA Question of the Week X-List-Unsubscribe: Send email to mailusers-request@2rosenthals.com X-List-Owner: mailusers-owner@2rosenthals.com ** Reply to message from Lewis G Rosenthal on Mon, 07 Feb 2005 13:26:48 -0500 > I thought this one was worth forwarding to the list. Enjoy! > > *Question of the Week* > > Bill, a wireless LAN end user at ABC Corporation, is transferring a file > over the wireless network to a server. Approximately half way through > the transfer, the transfer suddenly stops. Doing his own initial > troubleshooting Bill finds that his wireless connection is still active, > but he can no longer access the corporate network resources. Confused, > Bill calls the help desk who asks him to check his IP address. Upon > checking the IP address of Bill's workstation they find that his IP > address is on the wrong subnet. The subnet on which Bill's PC is > addressed is not part of the corporate network. The help desk technician > informs Bill that he has been subject to what kind of wireless attack? > > 1. Man-in-the-middle > 2. L2/L3 Hijacking > 3. TCP session hijacking > 4. Bit-flipping attack > 5. Spread spectrum RF jamming attack > 6. Eavesdropping attack > > *Question of the Week Aswer* > > Wireless L2/L3 hijacking attacks use a narrowband RF generator to jam > (interfere with) a specific transmission channel forcing users to roam > to another, more usable, channel. This usable channel is the software or > hardware (usually software) access point of the intruder. When the > authorized user makes an association to the intruder, this is deemed a > L2 hijack. Many operating systems such as Windows 2000 and Windows XP > automatically perform a DHCP renewal any time they lose Layer 2 > connectivity. For this reason, the intruder can install DHCP server > software on the same laptop in order to give the authorized user an IP > address when one is requested. This is deemed a Layer 3 hijack. The > reason for the Layer 3 hijack is that once the authorized user has an IP > address on the same network segment as the intruder, the intruder will > be able to perform Layer 7 (application layer) attacks against the > authorized user's computer. Very clear. Now it's much easier for me to understand why so many people use Windows2000 and WindowsXP operationg systems. Horation Alger was right: "If you build a better mousetrap, the world will beat a footpath to your door". -- Stan Goodman Qiryat Tiv'on Israel "When your enemy falls, do not rejoice." -- Proverbs 24:17 If a pig loses its voice, is it disgruntled? =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= To unsubscribe from this list, send a message to steward@2rosenthals.com with the command "unsubscribe os2-wireless_users" in the body (omit the quotes). For help with other commands, send a message to steward@2rosenthals.com with the command "help" in the body (omit the quotes). This list is hosted by Rosenthal & Rosenthal P.O. Box 281, Deer Park, NY 11729-0281. Non- electronic communications related to content contained in these messages should be directed to the above address. (CAN-SPAM Act of 2003) =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=