Types of Wireless Attacks
Types of Wireless Attacks This next lesson talks about the wide variety of Wireless Attack types there are and how they work. For example, you'll learn about Roque Access Points, what they do and how they create security issues. Amongst other key topics, you'll learn about "point-based" authentication standards" how they were developed and how to u...
Types of Wireless Attacks This next lesson talks about the wide variety of Wireless Attack types there are and how they work. For example, you'll learn about Roque Access Points, what they do and how they create security issues. Amongst other key topics, you'll learn about "point-based" authentication standards" how they were developed and how to use/confirm their use, what type of security issues an Evil Twin creates. [toggle_content title="Transcript"] Today we would be looking at the types of wireless attacks we will be taking several types of wireless attack, we have what's called a rogue access point, evil twin interference, blue snuffing blue jacking, the idea attack and replay attack. We start discussing the rogue access point. A rogue access point is the access point not authorized to be on your network. Any access point on your network that has not been put in place by the administrators is defined as a rogue access point. Your users, your clients or malicious person could plant a rogue access point on your network around you or on your network, simply to gain access to the Internet. This router might not have all the security settings that you have on your own systems, on your own network. Essentially the rogue access point could open up a window to your network ignoring all your other security settings. Administrators don't like rogue access points on their networks. In measure to protect this is to implement something called A.2.1. X. These are the point based identification standard. The point base identification standard that ensures that any connections to the suite or to the port must authenticate. So without authenticating real devices could not pool the resources of the network say Internet access or Internet service. Another type of rogue access point is something we have called evil twin. The evil twin is a fake access point that malicious persons will set up to allow unknown users log on to the Internet. There is a fake access point. The object is to capture their credentials. I could go to a public place like a general eat out or at the mall or at the airport and I set up my access point or my phone which is now a hot spot and I give it in the name of the exact access point at that location, say I visit a place like Starbucks and they have the access point is Starbucks. I create my own access point and I call it Starbucks. Unknowing-users will not know which is the real and which is a fake my access point is just to log on to the access point to which I couldn't capture their credentials. So any access point set up to capture credentials of users who use it we regard to that evil twin. Twins come in pairs, they look alike, so my access point is also looking a like the original access point but I have malicious intent to capture the credentials of anybody logging onto it. Another type a wireless attack is something we call interference. In some books you would find this is referred to as jamming. You would have this take place as a result of even the fabric of your publishing meant or malicious person could set up microwave devices to intercept your signals and essentially causing you some sort of denial of service. They intersecting us into your signals and interfering with the signal transmission. You could have a point to point signal transmission and maybe metal objects or certain other types of objects could be brought in please to interfere with the spread of your signals causing you what we call a denial of service. War-driving is, when you have individuals moving around in neighborhood, they are driving around the neighborhood in some sort of vehicle with wireless equipment searching for wireless networks. So you're driving around the neighborhood with equipment you can detect the S.S. ID you can detect this signal emanating from different Homes, you are said to be war-driving driving around and then once you find this wireless access point you could then put so markings are on the pavement on the building or on the fence. You are said to be war chalking. You have war chalking taking place after war driving in a war drive an attempt you drive around the neighborhood you find the wireless networks. Having found the wireless networks you could put symbols on the pavement on the fence on the building themselves, you are said to be war chalking. You are choking to identify locations where you found wireless signals; it could be signals that are protected or unprotected weak, strong you would indicate with a symbol and that is called war-chalking. Let's take a look at some Bluetooth attacks. There are attacks targeted to Bluetooth enabled devices. The first of which we have is blue Snuffing. Blue Snuffing is the method in which attackers gain access to unauthorized information on a wireless device using the blue tooth connection. Individuals using a Bluetooth phone, Bluetooth tablet or some other device will gain unauthorized access to information on a wireless device. That is blue Snuffing. With blue jacket, this is used by attackers to send out unwanted Bluetooth signals from smart phones to tablets or laptops. These attacks could be carried out against Bluetooth enabled devices. Best practice if you're not using your Bluetooth to turn it off. Before you do Bluetooth connections ensure that you know who was connecting, ensure that you get the access code. The searching will know where the connection is coming from, from whom it's coming from. Otherwise other people could gain malicious access to your phone, laptop or tablet and they could gather information unauthorized. I will now be discussing some common protocols and their ports. Protocols and their ports we need to know the functions of these protocols, we also need to know their port numbers and this is very important for the security plus exam. [/toggle_content]
Vulnerability Management is a continuous information security risk process that requires management oversight and includes a 4-tier approach of: discovery, reporting, prioritization, and response