10 28 2024 - rtji0/Arthur-Tech-Journal GitHub Wiki
10-28-2024
- VPN
Wireless Attacks
-
Cellular
-
Bluetooth
-
Near Field Communication (NFC)
-
Radio Frequency ID (RFID)
-
Wireless LAN
-
Heatmaps
Cellular Networks
-
Operated by telecom providers and are most widespread wireless networks
-
Faster 5G cell Service has allowed service providers to offer fixed wireless service for internet connectivity
-
Telecom service providers own, maintain and manage their own network equipment and facilities
-
End users are not responsible for configuring or securing these cell networks
Bluetooth Attacks
-
Bluetooth - wireless tech that uses short-range radio frequency (RF) transmissions for communications over short distances
-
Primary type of Bluetooth network topology is a piconet
-
Bluejacking - sends unsolicited messages to Bluetooth-enabled devices - more annoying than harmful
-
Bluesnarfing - access unauthorized info from a wireless device through Bluetooth connection -copies emails, contacts, pics, or other data without owner's knowledge
Near Field Communication (NFC) Attacks
-
A set of standards used to establish communication between devices in close proximity
-
Devices using NFC can be active or passive
-
Passive NFC can be read but does not read or receive info
-
Active NFC can read info as well as transmit data
Radio Frequency Identification (RFID) Attacks
-
Commonly used to transmit info between employee ID badges, inventory tags, book labels, and other paper-based tags that can be detected by a proximity reader
-
Passive, do not require power supply (can be very small)
-
susceptible to attacks such as unauthorized tag access, fake tags, and RFID cloning