Security: Types of Wireless Attacks - Paiet/Tech-Journal-for-Everything GitHub Wiki

  • Rogue access points

    • Unauthorized wireless AP that allow unauthorized persons access to the company network
  • Jamming/Interference

    • The use of electronic devices that either fill the wireless space with garbage packets or cause the AP to wait before transmitting
  • Evil twin

    • Unauthorized wireless AP that pose as a legitimate AP
    • Typically installed in public hotspots imitating legitimate APs in the hopes to launch man-in-the-middle attacks
  • War driving

    • The act of searching for open or poorly secured wireless networks
    • Use tools like NetStumbler
  • War chalking

    • The act of leaving symbols to mark open or poorly secured wireless network for others
  • IV attack

    • Allows the attacker to control the initialization vector, which is used to change the encryption key slightly to avoid the same text to produce the same ciphertext.
    • The attacker can then bypass this effect and gain access to the information
  • Packet sniffing

    • Used to intercept communications on a network
    • If enough packets are intercepted, entire communication threads can be reassembled revealing the messages contained
    • Typically used in information gathering in order to launch more sophisticated attacks
  • Replay attacks

    • Capturing packets and then sending them back out onto the network to manipulate traffic.
    • Typically used in conjunction with IV attacks to successfully break weak encryption
  • WEP/WPA attacks

    • Wired equivalent privacy
    • Uses a weak stream cipher to encrypt data and is vulnerable to IV attacks in order to crack the encryption
    • WiFi protected access
    • Uses a stronger key than WEP but still uses a stream cipher to encrypt data. because of this WPA is vulnerable to brute force password cracking
  • WPS attacks

    • WiFi protected setup
    • Feature typically on by default that simplifies connection to a wirless AP. an 8 digit pin is used to enroll a device onto the network. The pin is checked four digits at a time allowing just 10,000 guesses per half.
    • Standard hardware today can crack it a few hours
    • WPS attacks allow an attacker access to a wireless network exploiting the vulerability in the WiFi Protected Setup authentication process
  • Near field communication

    • Mobile payments and authentication exchanges happen over NFC. an attacker can use tools that can initiate this exchange to collect the information
    • A very close range attack
    • This attack can include straight up stealing the NFC device and using it directly
  • Bluejacking

    • a close range attack where the attacker send unsolicited messages via bluetooth
    • This also can include sending fake contacts to smartphones containing trojans
  • Bluesnarfing

    • A close range attack where the attacker gains access to a person's personal information via bluetooth