Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page48/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   44   45   46   47   48   49   50   51   ...   71
FULLTEXT01
ijsrp-p4303
Attack
Description
Methods and Tools
Eavesdropping Capturing and decoding unprotected application traffic to obtain potentially sensitive information.
bsd-airtools, Ethereal,
Ettercap, Kismet, commercial analyzers
WEP Key Cracking Capturing data to recover a WEP key using brute force or Fluhrer-Mantin-
Shamir (FMS) cryptanalysis.
Aircrack, AirSnort, chopchop, dwepcrack,
WepAttack,
WepDecrypt, WepLab Evil Twin AP Masquerading as an authorized AP by beaconing the WLAN's service set identifier (SSID) to lure users. cqureAP, HermesAP,
HostAP, OpenAP,
Quetec, WifiBSD AP Phishing Running a phony portal or Web server on an evil twin AP to "phish" for user logins, credit card numbers.
Airsnarf, Hotspotter
Man-in-the-
Middle Running traditional man-in-the middle attack tools on an evil twin AP to intercept TCP sessions or SSL/SSH tunnels. dsniff, Ettercap

Download 470.11 Kb.

Share with your friends:
1   ...   44   45   46   47   48   49   50   51   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page