<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">
Blog Post, Security in Seconds, Cyber Attacks

Security In Seconds: Do You Know Who is Connecting to Your Wireless Network?

Apr 22, 2021

Recent Content

When a device successfully connects to a network, the only information the network needs is the Media Access Control (MAC) address, which can usually be found on the back of every piece of hardware:

 

This makes total sense, because the MAC address is unique to the device. Over time, manufacturers have been implementing creative ways to hide this address in order to make it harder to track an individual based on their device. This includes allowing a user to be able to manually change their device’s MAC address. While this is a noble effort to protect a user’s privacy, and sounds great in the marketing material, it also opens up other security holes that are difficult to fill.

 

On most devices it is possible to manually change the assigned MAC address for the device. With that said, do you know if the devices connecting to your network are the actual physical devices that have been approved to connect to your wireless network?

 

As an attacker, it is trivial to identify devices that are joining the wireless network, change the MAC address of the attacker’s device, and join as the device approved to connect to the network. The attacker would then be able to steal data, and/or upload ransomware, without their presence ever being known. The only way to solve this is to be able to correlate a device’s physical hardware to the device’s MAC address. By having this data, it would be possible to know that an Intel device connected when the usual device was actually a Google Device.

 

SONAR, a subscription service that identifies wireless network threats and vulnerabilities, has a unique feature set that helps solve this challenge. 

Schedule a demo of Sonar’s full alert suite today

Tim Connell - Head of Enterprise Products

Tim Connell - Head of Enterprise Products

At his core Tim is just a normal guy who found a passion for technology and wants to use his knowledge to help others (people, companies) protect themselves from having their sensitive data compromised. He also enjoys working with professionals looking to advance their careers and is willing to give guidance anywhere that he can. As Head of Enterprise Products for Pulsar Security, he guides the team in creating solutions which satisfy the needs of real-world customers, specializing in the areas of data management, storage network visibility, and enterprise security. He has supported state and local governments, the Fortune 500, and small-medium sized businesses to help carry out this mission. Tim holds technical certifications as an Offensive Security Certified Professional (OSCP), CompTIA Network+, CompTIA Security+, GIAC Penetration Tester (GPEN), GIAC Web App Penetration Tester (GWAPT), and GIAC Python Coder (GPYC). Tim is an accomplished business consultant and strategist with credentials such as Certified ScrumMaster and HubSpot Sales Professional with deep training and knowledge in the Sandler Selling Methodology.