Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page47/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   43   44   45   46   47   48   49   50   ...   71
FULLTEXT01
ijsrp-p4303
Attack
Description
Methods and Tools
802.11 Data Deletion Jamming an intended receiver to prevent delivery while simultaneously spoofing
ACKs for deleted data frames. Jamming + Injection Tools X
EAP Replay Capturing X Extensible Authentication Protocols (e.g., EAP Identity, Success, Failure) for later replay. Wireless Capture + Injection Tools between station and AP X RADIUS Replay Capturing RADIUS Access-Accept or Reject messages for later replay. Ethernet Capture + Injection Tools between AP and authentication ser

™ Confidentiality attacks
These attacks attempt to intercept private or sensitive information sent over wireless associations - whether sent in the clear or encrypted by 802.11 or higher layer protocols. Eavesdropping, WEP Key Cracking, Evil Twin AP (poorly-understood attack) and Man- in-the-Middle (a form of active eavesdropping) are the most common attacks in this category. As shown in general taxonomy of WLAN security attacks (figure 8), eavesdropping is classified as passive attack whereas the rest are members of active attack class.

Download 470.11 Kb.

Share with your friends:
1   ...   43   44   45   46   47   48   49   50   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page