A List of Internet and Network Attacks

Pin Me

List of Wireless Network Attacks - Part 1

written by: PreciousJohnDoe•edited by: Bill Bunter•updated: 1/19/2011

Wireless Network Attacks have greatly increased in the past few years. It is now even possible for attackers to intercept secure web connections over the internet. While it is equally important to stay wireless, you should learn how hackers attack wireless networks & how to prevent the same. Read...

  • slide 1 of 3

    With the passage of time, attackers are getting smarter and smarter. They can now even intercept secure web connections with the help of proxy tools and digital certificates. While it is important to stay up to dated with the technology, but it is also important to learn how hackers attack wireless networks, what all technology they use, how they make you fall prey to wireless network attacks and what you can do to prevent such attacks. To gain a better understanding of different wireless network attacks and the basic strategy adopted by hackers for list of wireless network attacks, read more about it here:

    How SSL Encrypted Web Connections are Intercepted - Understanding the Concept

    How SSL Encrypted Web Connections are Intercepted - Attacking Strategy

  • slide 2 of 3

    Access Control Attacks

    Such attacks are used to infiltrate a wireless network by bypassing the access control measures. Below is a brief description of such attacks, along with their name and various tools & methods used.

    War Driving

    War driving involves listening for wireless networks using either a PDA or a computer. The main purpose of war driving attack is to find a launch point to initiate the main attack.

    Tools Used

    DStumbler, MacStumbler, Airmon-ng, Wellenreiter, KisMAC, WiFiFoFum and NetStumbler

    Rogue Access Points

    Instead of searching for free wireless networks, an attacker establishes a connection with an enterprise and uses their network to initiate its attack. Here, the enterprise acts as a launch point.

    Tools Used

    Can be any software or hardware access point

    Ad Hoc Associations

    With this technique, the attacker can connect to any unsecured access point or station.

    Tools Used

    USB adapter or a wireless card

    MAC Spoofing

    With this technique, the attacker changes the MAC address of any computer allowing it to bypass the server or routers to treat as a trusted and authorized access point or use it to hide the computer from the network.

    Tools Used

    Wellenreiter , MacChanger, SMAC, SirMACsAlot and wicontrol

  • slide 3 of 3

    Integrity Attacks

    These attacks are used to misguide user by sending him/her fake packets. The attacker first intercepts the communication and then adds his/her own packets in the communication in order to smooth the progress of other attacks.

    802.11 Frame Injection

    It includes creating data frames manually and delivering these fake data packets over the network.

    Tools Used

    Libradiate, Airpwn, WEPWedgie, File2air, wnet dinject/reinject and void11

    802.11 Data Replay

    It involves capturing the original frames and modifying them (replay).

    Tools Used

    Capturing and other injection tools

    802.1X Extensible AP Replay

    It involves capturing 802.1X Extensible AP for replay.

    Tools Used

    Wireless Capturing and other injection tools between access point and station

    802.1X RADIUS Replay

    Capturing RADIUS accepted or rejected messages for replay.

    Tools Used

    Ethernet Capturing and other injection tools between authentication server and access point

List of Wireless Network Attacks

In this series of articles related to List of Wireless Network Attacks, I will highlight different types of wireless network attacks, various tools or methods commonly used by attackers, technical terms associated with each type of attack and how a computer user can detect such attacks..
  1. List of Wireless Network Attacks - Part 1
  2. List of Wireless Network Attacks - Part 2
  3. List of Wireless Network Attacks - Part 3
More To Explore