Microsoft Word wlan security Assessment Countermeasures Final Draft Modified[1]



Download 470.11 Kb.
View original pdf
Page51/71
Date10.09.2021
Size470.11 Kb.
#57304
1   ...   47   48   49   50   51   52   53   54   ...   71
FULLTEXT01
ijsrp-p4303
Attack
Description
Methods and Tools AP Theft Physically removing an AP from a public space. Five finger discount" RF Jamming Transmitting at the same frequency as the target WLAN, perhaps at a power that exceeds regulation Equivalent
Isotopically Radiated Power (EIRP). RF Jammer, Microwave oven, AP with
Alchemy/HyperWRT firmware Queensland
DoS Exploiting the CSMA/CA Clear Channel Assessment (CCA) mechanism to make a channel appear busy. An adapter that supports CW Tx mode, with a lowlevel utility to invoke continuous transmit
802.11 Beacon Flood Generating thousands of counterfeit 802.11 beacons to make it hard for stations to find a legitimate AP. Fake AP
802.11 Associate / Authenticate Flood Sending forged Authenticates or Associates from random MACs to fill a target AP's association table
Airjack, File2air, Macfld, void 802.11 TKIP MIC Exploit Generating invalid TKIP data to exceed the target AP's MIC error threshold, suspending WLAN service.
File2air, wnet dinject
802.11
Deauthentic- ate Flood Flooding stations) with forged
Deauthenticates or Disassociates to disconnecting users from an AP.
Airjack, Omerta, void X
EAPStart Flood Flooding an AP with EAP-Start messages to consume resources or crash the target.
QACafe, File2air, libradiate X
EAPFailure Observing a valid X EAP exchange, and then sending the station a forged EAPFailure message.
QACafe, File2air, libradiate X EAP- of-Death Sending a malformed X EAP Identity response known to cause some APs to crash.
QACafe, File2air, libradiate X EAP Length Attacks Sending EAP type-specific messages with bad length fields to try to crash an AP or RADIUS server.
QACafe, File2air, libradiate

Download 470.11 Kb.

Share with your friends:
1   ...   47   48   49   50   51   52   53   54   ...   71




The database is protected by copyright ©ininet.org 2024
send message

    Main page