<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">
Security in Seconds

Security In Seconds: Do You Know Who is Connecting to Your Wireless Network?

Apr 22, 2021
New call-to-action

Recent Content

When a device successfully connects to a network, the only information the network needs is the Media Access Control (MAC) address, which can usually be found on the back of every piece of hardware:

 

Wireless-Network

This makes total sense, because the MAC address is unique to the device. Over time, manufacturers have been implementing creative ways to hide this address in order to make it harder to track an individual based on their device. This includes allowing a user to be able to manually change their device’s MAC address. While this is a noble effort to protect a user’s privacy, and sounds great in the marketing material, it also opens up other security holes that are difficult to fill.

 

On most devices it is possible to manually change the assigned MAC address for the device. With that said, do you know if the devices connecting to your network are the actual physical devices that have been approved to connect to your wireless network?

 

As an attacker, it is trivial to identify devices that are joining the wireless network, change the MAC address of the attacker’s device, and join as the device approved to connect to the network. The attacker would then be able to steal data, and/or upload ransomware, without their presence ever being known. The only way to solve this is to be able to correlate a device’s physical hardware to the device’s MAC address. By having this data, it would be possible to know that an Intel device connected when the usual device was actually a Google Device.

 

SONAR, a subscription service that identifies wireless network threats and vulnerabilities, has a unique feature set that helps solve this challenge. 

Schedule a demo of Sonar’s full alert suite today

Tim Connell

Tim Connell

As Head of Enterprise Products for Pulsar Security, he guides the team in creating solutions which satisfy the needs of real-world customers, specializing in the areas of data management, storage network visibility, and enterprise security. Tim holds technical certifications as an Offensive Security Certified Professional (OSCP), CompTIA Network+, CompTIA Security+, GIAC Penetration Tester (GPEN), GIAC Web App Penetration Tester (GWAPT), and GIAC Python Coder (GPYC).