Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
For 802.11 and bluetooth security people alike. Latest trends, attack surface issues, and prevention. How wireless security is becoming the new vector to hacking corporate websites and applications. 
Go to Topic: PreviousNext
Go to: Forum ListMessage ListNew TopicSearchLog In
WZC exploits
Posted by: jacknson
Date: April 28, 2007 08:18PM

Hey guys, i know i can have a genuine answer here;

From Microsoft Website,
http://www.microsoft.com/technet/community/columns/cableguy/cg1102.mspx

explains how the WZC clients computer works, i want to know if there is any update to the following. The document been dated in 2005 and i have been emailing Microsoft to find more, but still no anwser


How Wireless Auto Configuration Works

For the initial scan of available networks, Wireless Auto Configuration performs the following process:

1.Wireless Auto Configuration attempts to connect to the preferred networks that appear in the list of available networks in the preferred networks preference order, if the preferred networks are configured to automatically connect (the Connect when this network is within range checkbox is selected on the Connection tab for the properties of the preferred wireless network).

2.If there are no successful connections, Wireless Auto Configuration attempts to connect to the preferred networks that do not appear in the list of available networks, in the preferred networks preference order. This is done so that a Windows wireless client can connect to a hidden wireless network, one that is either not broadcasting its SSID or broadcasting an SSID of NULL. Configuring hidden wireless networks is used as a security measure to prevent malicious users from detecting and attempting a connection to a wireless network. However, the SSID is included in other types of wireless connection management frames and is easily discoverable by either capturing wireless management frames or using tools available on the Internet.

3.If there are no successful connections and there is an ad hoc network in the list of preferred networks that is available, Wireless Auto Configuration tries to connect to it.

4.If there are no successful connections and there is an ad hoc network in the list of preferred networks that is not available, Wireless Auto Configuration configures the wireless network adapter to act as the first node in the ad hoc network.

5.If there are no successful connections to preferred networks and there are no ad hoc networks in the list of preferred networks, Wireless Auto Configuration checks the Automatically connect to non-preferred networks setting.

6.If Automatically connect to non-preferred networks is enabled, Wireless Auto Configuration attempts to connect to the available networks the order in which the wireless adapter sensed them.

7.If all connection attempts to non-preferred networks fail or if Automatically connect to non-preferred networks is disabled, Wireless Auto Configuration creates a random wireless network name and places the wireless network adapter in infrastructure mode. After this, the wireless adapter is not connected to any wireless network but continues to scan for preferred wireless networks every 60 seconds. This behavior prevents the Windows wireless client from accidentally connecting to a wireless network that does not appear in the list of preferred networks. You are then prompted with the "One or more wireless networks are available" message in the notification area.

Options: ReplyQuote


Sorry, only registered users may post in this forum.