Maximum network discovery and fingerprinting distance with: |
Built-in client card antenna | ___ | 12 dBi omnidirectional | ___ |
15 dBi Yagi | ___ | 19 dBi directional | ___ |
ESSID security |
default |
| company name |
|
closed |
| address |
|
other relevant information | ______________________________ |
Bypassing closed ESSID |
closed ESSID value | ______________________________ |
Bypassing MAC filtering |
success with MAC | ______________________________ |
Cracking WEP keys |
key 1 | ______________________________ |
key 2 | ______________________________ |
key 3 | ______________________________ |
key 4 | ______________________________ |
cracking time | ___ | cracking tool | ___ |
WEP cracking acceleration |
| time saved | ___ |
traffic injection tool | ___ | type of traffic injected | ___ |
Brute-forcing 802.1x access |
password guessed | ______________________________ |
Other 802.1x attacks | Comments | ______________________________ |
Wireless man-in-the-middle attacks |
| | | Tool _________________ |
layer 1 attack (comments) | ______________________________ |
layer 2 attack (comments) | ______________________________ |
DoS attack resilience / detection (comments) | |
deauthentication flood | ______________________________ | | | | |
deassociation flood | ______________________________ | | | | |
malformed frames flood | ______________________________ | | | | |
excessive beacon flood | ______________________________ | | | | |
authentication flood | ______________________________ | | | | |
probe requests flood | ______________________________ | | | | |
Other attacks | ______________________________ | | | | |
Wireless traffic interception / analysis | | | | |
packets per minute | ___ | | | | |
plaintext and plaintext authentication protocols detected |
| | | | |
POP3 |
| Telnet |
| | | | |
SMTP |
| FTP |
| | | | |
IMAP |
| HTTP |
| | | | |
NNTP |
| Instant messengers |
| | | | |
IRC |
| SQL |
| | | | |
PAP |
| LDAP |
| | | | |
Other | ______________________________ | | | | |
passwords/user credentials collected | | | | |
username/password | ______________________________ | | | | |
username/password | ______________________________ | | | | |
username/password | ______________________________ | | | | |
username/password | ______________________________ | | | | |
weak encryption/vulnerable protocols detected | | | | |
LM/ NTLMv1 |
| SSHv1 |
| | | | |
Other | ______________________________ | | | | |
passwords cracked | | | | |
username/password | ______________________________ | | | | |
username/password | ______________________________ | | | | |
username/password | ______________________________ | | | | |
username/password | ______________________________ | | | | |
UNIX remote services | ___ | type | ___ |
SMB shares on WLAN | ______________________________ |
NFS shares detected | ______________________________ |
DHCP traffic detected | ______________________________ |
HSRP/VRRP traffic detected | ______________________________ |
HSRP password | ______________________________ |
VRRP authentication | ______________________________ |
VRRP password | ______________________________ |
CDP traffic detected | ______________________________ |
CDP data gathered | ______________________________ |
ICMP type 9/10 implementation |
| RIPv1 running |
|
Unauthenticated routing protocols over wireless network |
RIPv2 |
| OSPF |
|
IGRP |
| EIGRP |
|
IS-IS |
| IPX RIP |
|
NLSP |
| Other ________________ | |
Unauthenticated NTP traffic |
| SNMP traffic |
|
SNMP communities found | ___ | SNMP version | ___ |
NetBIOS over IPX traffic |
| AppleTalk traffic |
|
DecNet traffic |
| Banyan Vines traffic |
|
SNA traffic |
| Other ________________ |
|
Remote administration traffic | | | |
VNC |
| PCAnywhere |
|
Webmin |
| Other ________________ |
|
Remote X Server cookies |
| | | | |
Syslog traffic |
| over UDP |
|
| | | | over TCP |
|
Passive OS fingerprinting | _________________________________ | | | | | | |
Gateway discovery (IP) | _________________________________ | | | | | | |
IDS host discovery | _________________________________ | | | | | | |
ARP spoofing man-in-the-middle attack | _________________________________ | | | | | | |
Switch CAM table flooding | _________________________________ | | | | | | |
Route injection attacks | _________________________________ | | | | | | |
ICMP route redirection | _________________________________ | | | | | | |
DNS cache poisoning | _________________________________ | | | | | | |
DHCP DoS attacks | _________________________________ | | | | | |
Tunneling protocols attack | _________________________________ | | | | | |
VPN enumeration | _________________________________ | | | | | |
VPN-related attacks | _________________________________ | | | | | | |
Active OS fingerprinting | _________________________________ | | | | | | |
Discovered backdoors / backchannel traffic | _________________________________ | | | | | | |
Banner grabbing and host penetrationpenetrated hosts () | | | | | | |
IP/hostname:vulnerability | _________________________________ | | | | | | |
IP/hostname:vulnerability | _________________________________ | | | | | | |
IP/hostname:vulnerability | _________________________________ | | | | | | |
Network / host DoS resilience testing | | | | | | |
attack/host/result | _________________________________ | | | | | | |
attack/host/result | _________________________________ | | | | | | |
attack/host/result | _________________________________ | | | | | | |
Egress filtering firewall testing from the wireless site | _________________________________ | | | | | | |
Physical security issues discovered | _________________________________ | | | | | | |
Social engineering attacks | _________________________________ | | | | | | |