Advertisement
Tech

A List of Internet and Network Attacks

Wireless Network Attacks have greatly increased in the past few years. It is now even possible for attackers to intercept secure web connections over the internet. While it is equally important to stay wireless, you should learn how hackers attack wireless networks & how to prevent the same. Read…

By PreciousJohnDoe
Desk Tech
Reading time 3 min read
Word count 542
Smb security Computing Network security
A List of Internet and Network Attacks
Advertisement
Quick Take

Wireless Network Attacks have greatly increased in the past few years. It is now even possible for attackers to intercept secure web connections over the internet. While it is equally important to stay wireless, you should learn how hackers attack wireless networks & how to prevent the same. Read…

On this page

With the passage of time, attackers are getting smarter and smarter. They can now even intercept secure web connections with the help of proxy tools and digital certificates. While it is important to stay up to dated with the technology, but it is also important to learn how hackers attack wireless networks, what all technology they use, how they make you fall prey to wireless network attacks and what you can do to prevent such attacks. To gain a better understanding of different wireless network attacks and the basic strategy adopted by hackers for list of wireless network attacks, read more about it here:

How SSL Encrypted Web Connections are Intercepted - Understanding the Concept

Advertisement

How SSL Encrypted Web Connections are Intercepted - Attacking Strategy

Access Control Attacks

Such attacks are used to infiltrate a wireless network by bypassing the access control measures. Below is a brief description of such attacks, along with their name and various tools & methods used.

Advertisement

War Driving

War driving involves listening for wireless networks using either a PDA or a computer. The main purpose of war driving attack is to find a launch point to initiate the main attack.

Advertisement

Tools Used

DStumbler, MacStumbler, Airmon-ng, Wellenreiter, KisMAC, WiFiFoFum and NetStumbler

Advertisement

Rogue Access Points

Instead of searching for free wireless networks, an attacker establishes a connection with an enterprise and uses their network to initiate its attack. Here, the enterprise acts as a launch point.

Advertisement

Tools Used

Can be any software or hardware access point

Advertisement

Ad Hoc Associations

With this technique, the attacker can connect to any unsecured access point or station.

Advertisement

Tools Used

USB adapter or a wireless card

Advertisement

MAC Spoofing

With this technique, the attacker changes the MAC address of any computer allowing it to bypass the server or routers to treat as a trusted and authorized access point or use it to hide the computer from the network.

Advertisement

Tools Used

Wellenreiter , MacChanger, SMAC, SirMACsAlot and wicontrol

Advertisement

Integrity Attacks

These attacks are used to misguide user by sending him/her fake packets. The attacker first intercepts the communication and then adds his/her own packets in the communication in order to smooth the progress of other attacks.

802.11 Frame Injection

Advertisement

It includes creating data frames manually and delivering these fake data packets over the network.

Tools Used

Advertisement

Libradiate, Airpwn, WEPWedgie, File2air, wnet dinject/reinject and void11

802.11 Data Replay

Advertisement

It involves capturing the original frames and modifying them (replay).

Tools Used

Capturing and other injection tools

802.1X Extensible AP Replay

It involves capturing 802.1X Extensible AP for replay.

Tools Used

Wireless Capturing and other injection tools between access point and station

802.1X RADIUS Replay

Capturing RADIUS accepted or rejected messages for replay.

Tools Used

Ethernet Capturing and other injection tools between authentication server and access point

This post is part of the series: List of Wireless Network Attacks

In this series of articles related to List of Wireless Network Attacks, I will highlight different types of wireless network attacks, various tools or methods commonly used by attackers, technical terms associated with each type of attack and how a computer user can detect such attacks..

  1. List of Wireless Network Attacks - Part 1
  2. List of Wireless Network Attacks - Part 2
  3. List of Wireless Network Attacks - Part 3
Keep Exploring

More from Tech

Filed under
Smb security Computing
More topics
Network security
Advertisement