Time
1 hour 51 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

Types of Wireless Attacks This next lesson talks about the wide variety of Wireless Attack types there are and how they work. For example, you'll learn about Roque Access Points, what they do and how they create security issues. Amongst other key topics, you'll learn about "point-based" authentication standards" how they were developed and how to use/confirm their use, what type of security issues an Evil Twin creates. [toggle_content title="Transcript"] Today we would be looking at the types of wireless attacks we will be taking several types of wireless attack, we have what's called a rogue access point, evil twin interference, blue snuffing blue jacking, the idea attack and replay attack. We start discussing the rogue access point. A rogue access point is the access point not authorized to be on your network. Any access point on your network that has not been put in place by the administrators is defined as a rogue access point. Your users, your clients or malicious person could plant a rogue access point on your network around you or on your network, simply to gain access to the Internet. This router might not have all the security settings that you have on your own systems, on your own network. Essentially the rogue access point could open up a window to your network ignoring all your other security settings. Administrators don't like rogue access points on their networks. In measure to protect this is to implement something called A.2.1. X. These are the point based identification standard. The point base identification standard that ensures that any connections to the suite or to the port must authenticate. So without authenticating real devices could not pool the resources of the network say Internet access or Internet service. Another type of rogue access point is something we have called evil twin. The evil twin is a fake access point that malicious persons will set up to allow unknown users log on to the Internet. There is a fake access point. The object is to capture their credentials. I could go to a public place like a general eat out or at the mall or at the airport and I set up my access point or my phone which is now a hot spot and I give it in the name of the exact access point at that location, say I visit a place like Starbucks and they have the access point is Starbucks. I create my own access point and I call it Starbucks. Unknowing-users will not know which is the real and which is a fake my access point is just to log on to the access point to which I couldn't capture their credentials. So any access point set up to capture credentials of users who use it we regard to that evil twin. Twins come in pairs, they look alike, so my access point is also looking a like the original access point but I have malicious intent to capture the credentials of anybody logging onto it. Another type a wireless attack is something we call interference. In some books you would find this is referred to as jamming. You would have this take place as a result of even the fabric of your publishing meant or malicious person could set up microwave devices to intercept your signals and essentially causing you some sort of denial of service. They intersecting us into your signals and interfering with the signal transmission. You could have a point to point signal transmission and maybe metal objects or certain other types of objects could be brought in please to interfere with the spread of your signals causing you what we call a denial of service. War-driving is, when you have individuals moving around in neighborhood, they are driving around the neighborhood in some sort of vehicle with wireless equipment searching for wireless networks. So you're driving around the neighborhood with equipment you can detect the S.S. ID you can detect this signal emanating from different Homes, you are said to be war-driving driving around and then once you find this wireless access point you could then put so markings are on the pavement on the building or on the fence. You are said to be war chalking. You have war chalking taking place after war driving in a war drive an attempt you drive around the neighborhood you find the wireless networks. Having found the wireless networks you could put symbols on the pavement on the fence on the building themselves, you are said to be war chalking. You are choking to identify locations where you found wireless signals; it could be signals that are protected or unprotected weak, strong you would indicate with a symbol and that is called war-chalking. Let's take a look at some Bluetooth attacks. There are attacks targeted to Bluetooth enabled devices. The first of which we have is blue Snuffing. Blue Snuffing is the method in which attackers gain access to unauthorized information on a wireless device using the blue tooth connection. Individuals using a Bluetooth phone, Bluetooth tablet or some other device will gain unauthorized access to information on a wireless device. That is blue Snuffing. With blue jacket, this is used by attackers to send out unwanted Bluetooth signals from smart phones to tablets or laptops. These attacks could be carried out against Bluetooth enabled devices. Best practice if you're not using your Bluetooth to turn it off. Before you do Bluetooth connections ensure that you know who was connecting, ensure that you get the access code. The searching will know where the connection is coming from, from whom it's coming from. Otherwise other people could gain malicious access to your phone, laptop or tablet and they could gather information unauthorized. I will now be discussing some common protocols and their ports. Protocols and their ports we need to know the functions of these protocols, we also need to know their port numbers and this is very important for the security plus exam. [/toggle_content]

Video Transcription

00:04
Today we will be looking at the types of wireless attacks. We will be taking several types of wireless attacks. We have what is called rogue access point, even between interference. Blue snuffing blew Jack in the Ivy attack replay attack.
00:20
We started off discussing the rogue access point.
00:23
A rogue access point is the access point not authorized to be on your network.
00:29
Any access point on your network has not been put in place by the administrators.
00:35
Is defined as a rogue access point your users, your clients or militias. Person school. Plant a rogue access point on your network router on your network simply to gain access to the Internet.
00:48
This router might not have all the security settings
00:53
that you have on your own systems on your own network. Essentially, the rogue access point could open up a window to your network,
01:02
ignoring all your other security sentence.
01:04
Administrators don't like road access points on their networks. A measure to protect this is to implement something called 2.1 X.
01:15
This is a point based authentication standard, the Port Visit education standard that ensures that any connections to the sweet or to the ports must authenticate. So without what indicating rogue devices could not pull, the resource is off the network say, Internet access or Internet service.
01:34
I know that type of rogue access point is something we have called the Evil twin. Even between
01:42
is a fake access point that's
01:45
malicious. Persons will set up
01:49
toe, allow unknown users log onto the Internet there if it access point.
01:55
The objective is to capture their credentials. So I could go to a public place like Ah ah, General, eat out or more airport on. I set up my access point on my phone, which is now a hot spot,
02:12
and I give you the name of the exact at six point at that location.
02:17
Say I visit a place like Starbucks and they have. The access point is Starbucks. I create my own access point, and I call it Starbucks
02:28
on known Uses will not know
02:30
which is the aerial on, which is the fake. My access point is just to learn them long gone through the access point, true which I couldn't capture their credentials. So any access point set up toe capture credentials off users who use it. We got to that as the evil twin. You know,
02:51
twins come in pairs. They look alike.
02:53
So my access point is also looking alike The original access point. But I have malicious intent. Toe capture decreed in shells off, anybody logging onto it.
03:06
Another type of wireless attack is something we call interference. In some books you'd find, this is referred to as jamming, so you could have these take place as a result, off even the fabric off your establishment or malicious person school. Set up microwave devices
03:24
toe. Intercept your signals
03:27
on, essentially causing you some sort of denial of service. The intersecting yours inter Intercepting those signals and interfering with the signal transmission so you could have a point toe point. Signal transmission
03:42
on maybe metal objects or certain other types of objects could be brought in place.
03:47
Tau Inter affair with the spread of your signals, passing you what we call a denial of service. One driving is when you have individuals moving around in neighborhood the driving around the neighborhood in some sort of vehicle with wireless equipment, searching for wireless networks.
04:06
So you're driving around the neighborhood
04:09
with equipment you can detect. The SS I. D. You can detect the signal
04:15
emanating from different homes. You are said to be war driving driving around. And then once you find this wireless access points, you could then put some markings around on the pavement, on the building or on the fence. You are said to be war chalking.
04:30
So you have war chalking, taking place after war, driving in a war driving attempt. You drive around the neighborhood, you'll find the wireless networks,
04:41
and we have been found the wireless networks. You could put some balls on the pavement on the fence, on the building themselves. You are said to be war choking. You're choking toe. Identify locations where you found wireless signals. It could be signals that are protected or unprotected week strong.
05:00
You will indicate with the symbols
05:03
on that is called war choking.
05:05
Let's take a look at some Bluetooth attacks. Attacks They're Bluetooth
05:11
at that's targeted at Bluetooth enabled devices,
05:15
the first of which we have is blue. Snuffing
05:18
blue Snuffing is the method in which Attackers gain access toe Ah, notarized information on a wireless device
05:27
using the Bluetooth connection.
05:29
So individuals using the Bluetooth phone ah blue toe tablet or some other device could gain unauthorized access to information on a wireless device that is blue snuffing
05:42
with blue jacket.
05:44
This is used by Attackers to send out unwanted Bluetooth signals from smartphones, tablets or laptops,
05:53
so these attacks will be carried out against Bluetooth enabled devices.
05:58
Best practice. If you're no using your Bluetooth, turn it off
06:02
before you do Bluetooth connections to ensure that you know who's connecting. Ensure that you get the access code.
06:13
Be certain you know where the connection is coming from from whom it's coming from. Otherwise, other people could gain malicious access
06:20
to your phone, laptop or tablets, and they could gather information on authorized.
06:28
I will now be discussing some common protocols on the airports
06:32
protocols on the airports. We need to know the functions of these protocols, and we also need to know the airport numbers on this is very important for the security close exam

Up Next

Fundamental Vulnerability Management

Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response

Instructed By

Instructor Profile Image
John Oyeleke
Lead IT Security Instructor
Instructor