Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]


Table 7 Wireless Security Attacks 45 ™ Access control attacks



Download 470.11 Kb.
View original pdf
Page45/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   41   42   43   44   45   46   47   48   ...   71
FULLTEXT01
ijsrp-p4303
Table 7 Wireless Security Attacks
45
™ Access control attacks
These attacks attempt to penetrate a network by circumventing filters and firewalls to obtain unauthorized access. MAC spoofing (also known as identity theft) and Rogue Access Points are more common among these. War Driving, as explained in section 4.1.0 is a technique used for reconnaissance.
Attack
Description
Methods and Tools
War Driving Discovering wireless LANs by listening to beacons or sending probe requests, thereby providing launch point for further attacks.
DStumbler, KisMAC,
MacStumbler,
NetStumbler,
WaveStumbler, Rogue Access Points Installing an unsecured AP inside firewall, creating open backdoor into trusted network. Any hardware or software AP Ad Hoc Associations Connecting directly to an unsecured station to circumvent AP security or to attack station. Any wireless card or USB adapter MAC Spoofing
Reconfiguring an attacker's MAC address to pose as an authorized AP or station.
Bwmachak,
SirMACsAlot,
SMAC,Wellenreiter, wicontrol X RADIUS Cracking Recovering RADIUS secret by brute force from X access request, for use by evil twin AP. Packet capture tool on LAN or network path between AP and RADIUS server

Download 470.11 Kb.

Share with your friends:
1   ...   41   42   43   44   45   46   47   48   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page