10 28 2024 - rtji0/Arthur-Tech-Journal GitHub Wiki

10-28-2024

  • VPN

Wireless Attacks

  • Cellular

  • Bluetooth

  • Near Field Communication (NFC)

  • Radio Frequency ID (RFID)

  • Wireless LAN

  • Heatmaps

Cellular Networks

  • Operated by telecom providers and are most widespread wireless networks

  • Faster 5G cell Service has allowed service providers to offer fixed wireless service for internet connectivity

  • Telecom service providers own, maintain and manage their own network equipment and facilities

  • End users are not responsible for configuring or securing these cell networks

Bluetooth Attacks

  • Bluetooth - wireless tech that uses short-range radio frequency (RF) transmissions for communications over short distances

  • Primary type of Bluetooth network topology is a piconet

Screenshot 2024-10-28 102524

  • Bluejacking - sends unsolicited messages to Bluetooth-enabled devices - more annoying than harmful

  • Bluesnarfing - access unauthorized info from a wireless device through Bluetooth connection -copies emails, contacts, pics, or other data without owner's knowledge

Near Field Communication (NFC) Attacks

  • A set of standards used to establish communication between devices in close proximity

  • Devices using NFC can be active or passive

  • Passive NFC can be read but does not read or receive info

  • Active NFC can read info as well as transmit data

Screenshot 2024-10-28 104106

Radio Frequency Identification (RFID) Attacks

  • Commonly used to transmit info between employee ID badges, inventory tags, book labels, and other paper-based tags that can be detected by a proximity reader

  • Passive, do not require power supply (can be very small)

  • susceptible to attacks such as unauthorized tag access, fake tags, and RFID cloning