CWTS® Certified Wireless Technology Specialist

Total Page:16

File Type:pdf, Size:1020Kb

CWTS® Certified Wireless Technology Specialist ffirs.indd ii 8/25/2012 3:43:36 PM CWTS® Certified Wireless Technology Specialist Official Study Guide Second Edition wnload from Wow! eBook <www.wowebook.com> o D ffirs.indd i 8/25/2012 3:43:34 PM ffirs.indd ii 8/25/2012 3:43:36 PM CWTS® Certified Wireless Technology Specialist Official Study Guide Second Edition Robert J. Bartz ffirs.indd iii 8/25/2012 3:43:36 PM Senior Acquisitions Editor: Jeff Kellum Development Editor: Jim Compton Technical Editors: Bryan Harkins and Tom Carpenter Production Editor: Eric Charbonneau Copy Editor: Liz Welch Editorial Manager: Pete Gaughan Production Manager: Tim Tate Vice President and Executive Group Publisher: Richard Swadley Vice President and Publisher: Neil Edde Media Project Manager 1: Laura Moss-Hollister Media Associate Producer: Josh Frank Media Quality Assurance: Doug Kuhn Book Designer: Judy Fung Proofreader: Nancy Bell Indexer: Ted Laux Project Coordinator, Cover: Katherine Crocker Cover Designer: Ryan Sneed Copyright © 2012 by John Wiley & Sons, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-1-118-35911-2 ISBN: 978-1-118-49487-5 (ebk.) ISBN: 978-1-118-46131-0 (ebk.) ISBN: 978-1-118-49484-4 (ebk.) No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warran- ties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a com- petent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the informa- tion the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002. Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com. Library of Congress Control Number: 2012944669 TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. CWTS is a registered trademark of CWNP, Inc. All other trademarks are the property of their respec- tive owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book. 10 9 8 7 6 5 4 3 2 1 ffirs.indd iv 8/25/2012 3:43:38 PM Dear Reader, Thank you for choosing CWTS: Certifi ed Wireless Technology Specialist Offi cial Study Guide, Second Edition. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practical experience with a gift for teaching. Sybex was founded in 1976. More than 30 years later, we’re still committed to producing consistently exceptional books. With each of our titles, we’re working hard to set a new standard for the industry. From the paper we print on to the authors we work with, our goal is to bring you the best books available. I hope you see all that refl ected in these pages. I’d be very interested to hear your com- ments and get your feedback on how we’re doing. Feel free to let me know what you think about this or any other Sybex book by sending me an email at [email protected]. If you think you’ve found a technical error in this book, please visit http://sybex.custhelp.com. Customer feedback is critical to our efforts at Sybex. Best regards, Neil Edde Vice President and Publisher Sybex, an Imprint of Wiley ffirs.indd v 8/25/2012 3:43:38 PM ffirs.indd vi 8/25/2012 3:43:38 PM Acknowledgments I would like to thank my wife, Jeannie, and two adult children, Ashley and Jason, for their support and patience during the writing of this book. They made completing this project much easier for me. I would also like to thank everyone at Sybex who helped with the creation of this book, including acquisitions editor Jeff Kellum, production editor Eric Charbonneau, copy editor Liz Welch, editorial assistant Connor O’Brien and editorial manager Pete Gaughan. I owe all these individuals a lot of thanks for their patience while working with me on this book and keeping things on track. Jim Compton is the Development Editor for this edition of the book. Many thanks go to Jim for his time and his work in helping with the fl ow, organiza- tion, and suggestions that allowed me to make this book an easier read. His knowledge and attention to detail were a huge help. Also, thanks to Tom Carpenter the proofread technical editor for this edition of the book. The Technical Editor for this edition of the book again is Bryan Harkins. I want to thank Bryan for his timely reviews, comments, and great suggestions that helped make this book a valuable reference source. His years of experience as a technical trainer, engineer, security specialist and author were a great contribution in creating a book I hope you will enjoy reading. I would again like to thank the thousands of students who have taken the time to attend the computer networking classes I was given the opportunity to teach. Educating, mentor- ing, and entertaining so many of these individuals gave me the inspiration and motivation to author this book and hopefully many more. Of course, this book would not exist if it were not for the people at CWNP. The CWNP team has realized the need for vendor-neutral wireless LAN training and certifi cation and has done a great job of building a brand over the years that is now known worldwide. Finally, a thank you to all the manufacturers, vendors, organizations, and individuals that provided the subject matter, allowing me the technology and tools needed to write this book. Aerohive (www.aerohive.com): Devin Akin and Bryan Harkins AirMagnet/Fluke Networks (www.flukenetworks.com): Joe Kuo Aruba Networks (www.arubanetworks.com) Broadcom Corporation (www.broadcom.com) Cisco Systems (www.cisco.com) CompactFlash Association (www.compactflash.org) CWNP (www.cwnp.com) Ekahau (www.ekahau.com): Jussi Kiviniemi EnGenius Technologies (www.engeniustech.com) HP ProCurve (www.procurve.com) ffirs.indd vii 8/25/2012 3:43:38 PM viii Acknowledgments IEEE (www.ieee.org) Intel (www.intel.com) L-com Global Connectivity (www.l-com.com): Jim Corcoran MetaGeek (www.metageek.net): Mark Jensen, Trent Cutler and Ryan Woodings Motorola (www.motorola.com) Netgear (www.netgear.com) Network Stumbler (www.netstumbler.com) PCI-SIG (www.pcisig.com) Proxim Wireless (www.proxim.com) Psiber Data Systems (www.psiber.com) SD Association (www.sdcard.org) TamoSoft (www.tamos.com): Michael Berg TerraWave Solutions (www.terrawave.com) USB Implementers Forum, Inc. (www.usb.org) Wi-Fi Alliance (www.wi-fi.org) WildPackets (www.wildpackets.com) Xirrus (www.xirrus.com) ffirs.indd viii 8/25/2012 3:43:38 PM About the Author Robert J. Bartz is a technical trainer and computer networking consultant. He is a graduate of California State University Long Beach, School of Engineering, with a Bachelor of Science degree in Industrial Technology. Prior to becoming a computer networking engineer and technical instructor, Robert was employed as an aerospace test engineer working with radar systems and satellite communications. He has attained many technical certifi cations over the years, including Master Certifi ed Novell Engineer (MCNE), Master Certifi ed Novell Instructor (MCNI), Microsoft Certifi ed Systems Engineer (MCSE), Microsoft Certifi ed Trainer (MCT), CWNP Certifi ed Wireless Network Administrator (CWNA), Certifi ed Wireless Security Professional (CWSP), and Certifi ed Wireless Network Trainer (CWNT), to name a few.
Recommended publications
  • Wireless Local Area Networks: Threats and Their Discovery Using Wlans Scanning Tools Ms
    International Journal of Advanced Networking Applications (IJANA) ISSN No. : 0975-0290 137 Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools Ms. Rakhi Budhrani Bhavnagar, Gujarat, India. Dr. R. Sridaran, Dean, Faculty of Computer Applications, Marwadi Education Foundation’s Group of Institutions, Rajkot, Gujarat, India. ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------- Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected environment in terms of privacy is again an anonymous issue. Realizing the miscellaneous threats and vulnerabilities associated with 802.11-based wireless networks and ethically hacking them to make them more secure is what this paper is all about. On this segment, we'll seize a look at common threats, vulnerabilities related with wireless networks. This paper presents an overview some of the WLANs Scanning, Sniffing and Auditing tools available on the internet. This paper Reviews these tools along with their merits, demerits and how they can be used for hacking, exploiting security holes and their usage characterization in WLANs. Keywords - Current threats in WLANs, Exploiting Security, WLANs Scanning, WLANs Sniffing, Multifunctional, WLANs auditing tools penetrate any wired network via wireless network as Access Point (AP) is bridging between wireless and I. INTRODUCTION wired network. Wireless Networks present a host of issues for network managers. Unauthorized access he Institute of Electrical and Electronics points, broadcasted SSIDs, unknown stations, MITM Engineers (IEEE) provides 802.11 set of attacks such as session hijacking and spoofed MAC standards for WLANs.
    [Show full text]
  • PDF with Notes
    Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security auditing, and spectrum analysis. Version 1.4 by Rob, @2009-11-23 Version 1.5 by Rob, @2010-02-28 Version 1.6 by Rob, @2010-03-12 Goals ‣ The goal of this talk is to provide an introduction to a few software tools that will help you to: ‣ monitor your WiFi network to identify problems ‣ perform security audits and prevent attacks ‣ observe the ongoing performance of your network and plan for future needs ‣ detect interference 2 Types of wireless tools ‣ Network ESSID scanners ‣ Wireless protocol analyzers ‣ Encryption cracking tools ‣ Wireless device auditing and management ‣ “War driving” tools: network mapping ‣ Spectrum analysis 3 Built-in wireless clients 4 If a computer has a wireless card, it has a basic network scanner. NetStumbler http://www.stumbler.net/ 5 NetStumbler was one of the first and most widely used WiFi detection tools. It runs only in Windows XP or Windows 2000, and works with many (but not all) wireless cards. NetStumbler can be used for mapping the coverage of your WiFi network, War Driving, rogue AP detection, aligning antennas on a long distance link, and more. NetStumbler is not open source, and was last updated in 2004. http://www.vistumbler.net/ 6 Vistumbler is an updated open source network detection tool for Windows Vista and Windows 7. It supports many of the same features as NetStumbler, including network detection and GPS integration. It also works with Google Earth to allow realtime WiFi mapping on a live map.
    [Show full text]
  • Evaluating Kismet and Netstumbler As Network Security Tools & Solutions
    Master Thesis MEE10:59 Evaluating Kismet and NetStumbler as Network Security Tools & Solutions Ekhator Stephen Aimuanmwosa This thesis is presented as part requirement for the award of Master of Science Degree in Electrical Engineering Blekinge Institute of Technology January 2010 © Ekhator Stephen Aimuanmwosa, 2010 Blekinge Institute of Technology (BTH) School of Engineering Department of Telecommunication & Signal Processing Supervisor: Fredrik Erlandsson (universitetsadjunkt) Examiner: Fredrik Erlandsson (universitetsadjunkt i Evaluating Kismet and NetStumbler as Network Security Tools & Solutions “Even the knowledge of my own fallibility cannot keep me from making mistakes. Only when I fall do I get up again”. - Vincent van Gogh © Ekhator Stephen Aimuanmwosa, (BTH) Karlskrona January, 2010 Email: [email protected] ii Evaluating Kismet and NetStumbler as Network Security Tools & Solutions ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. In fact the security problems and solution of information systems are becoming more and more complex and complicated as new exploit security tools like Kismet and Netsh (a NetStumbler alternative) are developed. This thesis work tried to look at the passive detection of wireless network capability of kismet and how it function and comparing it with the default windows network shell ability to also detect networks wirelessly and how vulnerable they make secured and non-secured wireless network.
    [Show full text]
  • A Practical Guide to Understanding Wireless Networking Concepts, Security Protocols, Attack, and Safer Deployment Schemes
    Rochester Institute of Technology RIT Scholar Works Theses 2003 A Practical guide to understanding wireless networking concepts, security protocols, attack, and safer deployment schemes Jay Yip Follow this and additional works at: https://scholarworks.rit.edu/theses Recommended Citation Yip, Jay, "A Practical guide to understanding wireless networking concepts, security protocols, attack, and safer deployment schemes" (2003). Thesis. Rochester Institute of Technology. Accessed from This Thesis is brought to you for free and open access by RIT Scholar Works. It has been accepted for inclusion in Theses by an authorized administrator of RIT Scholar Works. For more information, please contact [email protected]. Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology Thesis Approval Form Student Name: __.:::..:Ja::::.lyl..-Y.:.....:i~p _____________ Thesis Title: A Practical Guide To Understanding Wireless Networking Concepts, Sec.urity Protocols, Attack, and Safer Deployment Schemes Thesis Committee Name Signature Date Prof. Bruce Hartpence Bruce Hartpence Chair Bradley R. Newcomer Bradley R. Newcomer 5 -11 -OL( Committee Member Robert B. Cummings Robert B. Cummings 5-11-01: Committee Member Thesis Reproduction Permission Form Rochester Institute of Technology B. Thomas Golisano College of Computing and Information Sciences Master of Science in Information Technology A Practical Guide To Understanding Wireless Networking Concepts, Security Protocols,
    [Show full text]
  • Engineering Wireless-Based Software Systems and Applications for a Listing of Recent Titles in the Artech House Computing Library, Turn to the Back of This Book
    Engineering Wireless-Based Software Systems and Applications For a listing of recent titles in the Artech House Computing Library, turn to the back of this book. Engineering Wireless-Based Software Systems and Applications Jerry Zeyu Gao Simon Shim Hsing Mei Xiao Su a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Engineering wireless-based software systems and applications.—(Artech House computing library) 1. Software engineering 2. Wireless communications systems I. Gao, Jerry 005.1 ISBN-10: 1-58053-820-7 ISBN-13: 978-1-58053-820-6 Cover design by Yekaterina Ratner © 2006 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, includ- ing photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this informa- tion. Use of a term in this book should not be regarded as affecting the validity of any trade- mark or service mark. 10 9 8 7 6 5 4 3 2 1 To my wife Tracy and my lovely son Kevin To my parents Ming Gao and Ye-Fang Qin —Jerry Zeyu Gao To my Mom and Dad —Simon Shim To my wife Teresa,
    [Show full text]
  • Comparative Analysis of Wireless Devices
    SMART 2012 : The First International Conference on Smart Systems, Devices and Technologies Comparative Analysis of Wireless Devices Maria Astrakhantceva Andrei Sukhov Samara State Aerospace University, Samara State Aerospace University, Moskovskoe sh., 34, Moskovskoe sh., 34, Samara, 443086, Russia Samara, 443086, Russia E-mail: [email protected] E-mail: [email protected] Abstract—In this paper, we attempt to compare the quality of Finally, Section IV discusses the ramifications of the experi- communication wireless equipment manufactured by different ments. vendors. A range of smart devices operating in the various standards are available on the market today. Special attention is II. THE MODEL OF COMPARATIVE ANALYSIS paid to the WiFi standard as the most popular and affordable due to cheap hardware. The dependence of packet loss on According to the IETF standard from RFC 2544 [1], the the signal power level and load bus is described using linear quality characteristics of a TCP/IP based network are de- approximation. The resulting model coefficients have been found scribed by the following parameters [5]: in the experiment and compared. A description is given of the experiment, which was conducted for several types of equipment, • D - packet delay (measured in milliseconds, ms); and the main features of the equipment are identified. • p - packet loss (measured in percent, %); • j - delay variation or network jitter (measured in mil- Keywords-quantitative comparison of the WiFi equipments; packet loss; connection quality of the wireless standard liseconds, ms); IEEE802.11b/g/n • B - available bandwidth for end to end connections (measured in Megabits per second, Mbps). I. INTRODUCTION For wireless networks the main parameter of network con- nection quality is packet loss.
    [Show full text]