Wi-Fi Attacks
Major Wi-fi attacks are done by setting up a rogue Access Point.
Evil Twin attack:
Here the assaulter sets up a pretend access purpose with the same name thereto of a company AP close to the corporate premises. once an associate worker unwittingly connects to the current access purpose thinking that to be the real AP of the corporate, he/she offers away the authentication details of the initial access purpose. The assaulter, thus, is in a position to compromise the affiliation.
Jamming Signals:
An assaulter will disrupt the network affiliation by electronic countermeasures the signal, their square measure functioning tools for this purpose conjointly known as making noise.
Misconfiguration Attacks:
If a router is ready up the mistreatment of the default configuration, weak credentials, weak secret writing algorithms, then the assaulter will simply force an entry into the network.
Honey spot Attack:
An assaulter will create pretend access points/hotspots with an equivalent SSID as that of a public wi-fi AP; so, he will set traps for the user's World Health Organization hook up with these AP’s.
Unauthorized/Ad-Hoc affiliation attacks:
An assaulter will modify associate AD-HOC affiliation in an exceedingly user’s system utilizing Trojan, malware, or if an associate worker is already mistreated associate AD-HOC affiliation to share the web with peers. The assaulter will compromise the affiliation in operation in AD-HOC mode since this mode doesn't offer stronger secret writing to the affiliation.
Methodology:
An assaulter has got to decide the wireless devices through strategies like war-walking, warchalking, war-driving. There are square measure tools like NetStumbler, kismat to seek out wireless access points and capture the traffic.
Once he captures the traffic of that affiliation, he has got to analyze the traffic mistreatment protocol analyzers to spot the authentication methodology used, SSID, and connected devices and the way to compromise the affiliation.
Depending upon the protocol used for secret writing, he has got to follow totally different tools/methods to interrupt the network and gain access to the unauthorized network.
Countermeasures:
- Always use WPA/WPA2 secret writing.
- Do not share your credentials.
- Do not open untrusted emails.
- Use IDS/Firewalls to filter the connections.
- Change the default configurations.
- Enable MAC-address filtering.
- Use a centralized server for authentication.
- Do not hook up with untrusted/public wireless fidelity hotspots.
1 comment