Coconote
AI notes
AI voice & video notes
Export note
Try for free
Protecting Networks from Rogue Devices
Aug 9, 2024
Network Security: DHCP and Rogue Devices
DHCP (Dynamic Host Configuration Protocol)
Purpose
: Assign IP addresses automatically.
Process
: Occurs every time a device connects to the network.
Benefit
: Network administrators don’t need to manually assign IP addresses.
Security Issue
: No inherent security; attackers can set up rogue DHCP servers.
Results in invalid or duplicate IP addresses.
Leads to intermittent or no connectivity for affected devices.
Preventing Rogue DHCP Servers
Monitoring
: Constantly monitor for unauthorized DHCP communication.
DHCP Snooping
: A switch feature that detects and blocks rogue DHCP servers.
Microsoft Networks
: Authorize DHCP servers in Active Directory.
Actions if Rogue DHCP is found
:
Disable the interface the rogue DHCP server is on.
Instruct devices to release and renew their IP leases.
Rogue Access Points
Definition
: Unauthorized wireless access points connected to the network.
Concerns
: Security risks due to potential unauthorized access.
Installation
: Easy to install, can be inexpensive, or can be created via wireless sharing on a device.
Detection
: Security teams perform periodic wireless surveys.
Prevention
: Enable 802.1x or Network Access Control (NAC).
Requires proper authentication before granting network access.
Wireless Evil Twin
Definition
: A malicious wireless access point designed to mimic legitimate ones.
Purpose
: Gather information from connected devices or perform phishing attacks.
Characteristics
:
Similar SSID and security settings as legitimate access points.
Strong radio signal to overpower legitimate access points.
Risk Areas
: Open Wi-Fi hotspots and public areas.
Protection
:
Use a Virtual Private Network (VPN).
Ensure all communication is encrypted (e.g., HTTPS).
📄
Full transcript