Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Wireless Networking

AirMagnet Wi-Fi Security Tool Takes Aim At Drones 52

alphadogg (971356) writes "In its quest to help enterprises seek out and neutralize all threats to their Wi-Fi networks, AirMagnet is now looking to the skies. In a free software update to its AirMagnet Enterprise product last week, the Wi-Fi security division of Fluke Networks added code specifically crafted to detect the Parrot AR Drone, a popular unmanned aerial vehicle that costs a few hundred dollars and can be controlled using a smartphone or tablet. Drones themselves don't pose any special threat to Wi-Fi networks, and AirMagnet isn't issuing air pistols to its customers to shoot them down. The reason the craft are dangerous is that they can be modified to act as rogue access points and sent into range of a victim's wireless network, potentially breaking into a network to steal data."
This discussion has been archived. No new comments can be posted.

AirMagnet Wi-Fi Security Tool Takes Aim At Drones

Comments Filter:
  • by radioact69 ( 1220518 ) on Tuesday July 22, 2014 @10:19AM (#47507575) Homepage
    This is the dumbest thing I have ever read, and I have read some dumb stuff. Slashdot FAIL.
  • by ledow ( 319597 ) on Tuesday July 22, 2014 @12:13PM (#47508409) Homepage

    Anyone who worries about wireless security and hasn't yet deployed WPA2-Enterprise and VLANs deserves everything they get.

    Seriously, an employee plugging in a router? ALARM BELLS GO OFF IN IT ROOM.

    An employee sets up a duplicate wireless network with the same SSID?

    Weird. None of the connection policies match, so nothing officially supplied by IT will connect to it. And employees "might" connect to it, manually, sure. If it wasn't that the wireless AP's around the place have spotted the intruder, emailled me, triangulated the position of the AP, flooded it off the airwaves, and you'd have to re-type in all your RADIUS / WPA keys into it in order for it to actually let you CONNECT without warnings anyway.

    It's just not a problem if you are serious about your wireless deployment. If you're not serious, that's the problem.

    I'm an IT guy that works in schools, with hostile users, some of them living on-premises, willing to break all the rules, some of whom have built their own drones to fly around the school premises, and this isn't an issue I'd be concerned about.

    For a start, the Cisco Meraki gear I use would "contain" any such network, and it would warn me, and it would even put a little pinpoint on a wireless heatmap if I so desired to tell me where they are.

    The rest is just taking a smartphone with a free app, walking to that point, and disciplining whoever I found there / taking down the drone and waiting for someone to come claim it.

And it should be the law: If you use the word `paradigm' without knowing what the dictionary says it means, you go to jail. No exceptions. -- David Jones

Working...