Showing posts with label Network Administrator. Show all posts
Showing posts with label Network Administrator. Show all posts

Friday, October 30, 2009

NetStumbler,Cyberspace and Other Network Tools

There are many tools and utilities that can help a Network Administrator. One must know what tools are available, how to use them, and what their legal parameters are.

Stated to the point in a Wiki article (2009),
  • NetStumbler (also known as Network Stumbler) is a tool for Windows that facilitates detection of Wireless LANs using the 802.11b, 802.11a and 802.11g WLAN standards. It runs on Microsoft Windows operating systems from Windows 2000 to Windows XP.
  • Commonly used for:

    • Wardriving
    • Verifying network configurations
    • Finding locations with poor coverage in a WLAN
    • Detecting causes of wireless interference
    • Detecting unauthorized ("rogue") access points
    • Aiming directional antennas for long-haul WLAN links
I find that "unauthorrized ('rogue') access points" refers to access points intended for spoofing.

After searching a little on Wardriving I found that it is the act of recording and then usually mapping Wifi points. It is not piggybacking another person's or entity's network. Which is punishable by law.

Read your state laws for "breaking and entering" in cyberspace at http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/ComputerHackingandUnauthorizedAccessLaws/tabid/13494/Default.aspx

An interesting point to consider is that when wardriving with NetStumbler, there is communication between the network and you as a war-driver. Thus, there could be legal issues.
Lets look at some articles that have to do with Network tools like Nmap, Wireshark, and Netstumbler.

Preston (2001) a writer for the Journal of Law and Policy expressed many valid points in 2001, which are still valid today. He extensively cites many court cases including State vs. Allen.
And states that basic defense methods like firewalls "that [prevent] port scans but not nmap-type OS fingerprinting might establish a strong case for liability against a nmap scanner...the cost of preventing nmap-type OS fingerprinting might be found minimal; the court might assign liability only where the defendant used other means to get the information".

Cited List
Related Links

Wednesday, October 21, 2009

Port Scanning with Nmap: The How To

Tutorial Article Nmap: A valuable open source tool for network security by Michael Cobb.
I found this article very useful to learn more about the general Scanning fundamentals.
See how to spoof ports, fragment packets, scan to determine the Operating System, and save reports to your computer.

The Reference Guide to Nmap
http://nmap.org/book/man.html

This is a site with helpful tips. This is a page is associated with the above page.
http://nmap.org/book/man-port-scanning-techniques.html

Wednesday, October 7, 2009

Protecting Your Network: Sniffing

When sniffing your network you need to be able to recognize the "captures".

In Wireshark's Wiki, sample captures are listed so that you can recognize
  • Crack Traces
  • Viruses
  • Protocol Traffic
  • Wifi
Also it is important to be able to recognize the varying methods of attacks. Wikipedia explains a number of attacks and also gives some prevention tips.