Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

CSF: Wireless Detections

by Stephanie Dunn
February 26, 2016

CSF: Wireless Detections Screenshot

As organizations continue to evolve, wireless technologies are being integrated into existing networks to support employee mobility needs. Misconfigured wireless devices can pose a security risk, and leave a network vulnerable to attack by unauthorized users and devices. This dashboard aligns with the NIST Cybersecurity Framework (CSF) PR.PT-4 subcategory, which utilizes both active and passive methods to identify wireless access points and vulnerabilities found within a network. 

The CSF provides guidance based on existing standards, guidelines, and practices that can be tailored to specific organizational needs. This dashboard utilizes the Protective Technology subcategory within the CSF Protect category, which assists in ensuring that security of, and access to, wireless systems are controlled.

This dashboard will assist in providing an inventory of wireless access points, events from wireless devices, and wireless vulnerabilities. An important aspect of detecting wireless devices is identifying access points by their Service Set Identifier (SSID). Nessus plugins are utilized to detect both wireless access points and SSID’s with a network. Tables are sorted by Class C address space and detected hosts using wireless. Trend chart data reflects both active and passive wireless access point detections, which could identify new or rogue wireless device connections. Several components display both active and passive wireless access points, along with wireless vulnerabilities. This information can assist the analyst in quickly determining the host count, severity level, and if any of the detections are exploitable. Lastly, a table of wireless events captured by the Log Correlation Engine (LCE) will alert the analyst to events such as new host connections, rogue access points, and more.

The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessment. The dashboard requirements are:

  • Tenable.sc 5.2.0
  • Nessus 8.5.1
  • LCE 6.0.0
  • PVS 5.9.0

Tenable's Tenable.sc Continuous View (CV) is the market-defining continuous network monitoring platform. Tenable.sc CV includes active vulnerability detection with Nessus and passive vulnerability detection with Tenable’s Nessus Network Monitor (NNM), as well as log correlation with Tenable’s Log Correlation Engine (LCE). Using Tenable.sc CV, an organization will obtain the most comprehensive and integrated view of wireless events and devices across the network.

The following components are included in this dashboard:

  • Wireless Detections - Active and Passive Detection of Access PointsThe Active and Passive Detection of Access Points chart displays a trend over the last 25 days of all wireless access points detected actively or passively.  Wireless devices are identified for both passive and active detections over a 24-hour period, trending for 25 days.  Spikes in trend activity for active detections usually depict when active Nessus scanning on the network has occurred, while passive detections occur immediately when devices are detected by Tenable’s Passive Vulnerability Scanner.
  • Wireless Detections - Networks with Wireless Access Points/SSID: The Networks with Wireless Access Points/SSID table displays detections by count of Wireless Access Points detected by active scanning, and presents the count by Class C address space. The table quickly allows the analyst to determine the physical counts of wireless access points by Class C address space within the organization.  This allows the analyst to determine if any access points are outside of any specified address space.  This table allows for immediate drill down for a more detailed view.
  • Wireless Detections - Location by Asset: The Location by Asset table lists Nessus plugin 25197 – Windows Wireless SSID Detection result totals by Tenable.sc asset names. In Tenable.sc, hosts can be grouped by a large number of criteria including network location. To use the table efficiently, it would be prudent to ensure that asset names representing network locations include some indicator if they are within a known WLAN network range.
  • Wireless Detections - Wireless Vulnerabilities by Severity (Counts and Exploits): The Wireless Vulnerabilities by Severity matrix component presents a severity and vulnerability summary that allows the analyst to quickly determine the physical counts of detections by severity and if any of the detections are exploitable.
  • Wireless Detections - New Wireless Access Points and SSID: The New Wireless Access Points and SSID indicates on triggers from active and passive detection type plugins, by plugin ID, and vulnerability text.  Data displayed displays the number of wireless access points detected over time.  Indications are filtered by time, into columns for the last 24 hours, last 7 days and last 30 days. If no indication is present for the specified time period, zero is shown.  If an alert is present, the indication changes to the number of access points discovered.  The analyst may click on the indicator to retrieve further details on the number of access points discovered during the scan.
  • Wireless Detections - Viral SSIDs: This Viral SSIDs matrix derives its list of interesting SSIDs from an article published in 2008 titled: Study shows viral SSIDs could be creating a massive wireless botnet. Reading about ad hoc wireless networks and recommended Windows related configuration settings is very interesting and the topic is made even more interesting by attempting to find the relevant settings mentioned in published hardening guides. The matrix is a convenient way to provide a grouping of interesting SSIDs as reported by plugin 25197. After a wireless site survey, you may wish to repurpose the matrix to list other interesting SSIDs not broadcast by your organization. Please take into consideration that the SSID filtering performed by the dashboard components is case insensitive.
  • Wireless Detections - Hosts Utilizing WiFi: The Hosts Utilizing WiFi table component utilizes data from Nessus plugin 24272, Network Interface Enumeration, and filters for the term “wireless” to display hosts that have active wireless interfaces. Plugin output displays the network interface details, including the MAC address and IP address.
  • Wireless Detections - Top 50 Wireless Notifications By Severity: The Top 50 Wireless Notifications By Severity table component displays a list of the Top 50 most prevalent detections using the vulnerability summary tool, sorted by total.  The table presents the analyst with a method to view detections in a readable format.  Detections that are the most common are listed at the top of the table and are sorted in a descending order.  The plugin ID, name, family and severity rating are also displayed for the analyst.  Detections are listed by using a filter for the “wireless” keyword contained within the vulnerability text.  This may or may not represent an actual vulnerability associated with a wireless AP, but will represent any possible wireless related vulnerability.
  • CSF - Wireless Events (Last 72 Hours): Monitoring wireless devices and services is essential in protecting against unauthorized users and devices from connecting to the network. This component will display events detected by the Log Correlation Engine (LCE) on wireless-based events from wireless access points, wireless controllers, new wireless hosts, and wireless routers. The analyst will find this information valuable in detecting rogue access points and other unauthorized hosts attempting to connect to the network.
  • CSF - Suspected Wireless Devices: Along with wireless devices, many stand-along devices today include wireless access capabilities such as printers, digital cameras, and more. This component presents detected suspected wireless devices on hosts within a network. Analysts can drill down to obtain additional information on the suspected wireless device, and determine whether the device is authorized for use on the network.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training