Вы находитесь на странице: 1из 6

Types of wireless attacks

1. Packet Sniffing
2. Rouge Access Point
3. Man in the Middle Attack
4. Jamming
5. War Driving
6. Bluetooth Attacks
7. WEP/WPA Attacks
8. Password Theft

https://phoenixts.com/blog/types-of-wireless-network-attacks/

10 Public Wi-Fi Security Threats:

https://www.safervpn.com/blog/10-public-wi-fi-security-threats/

1. Man-in-the-Middle

hackers intercept data packages as they travel between victims.. Attackers will
intercept messages between two users who believe they are talking directly to
one another. Connections without authentication protocols are victims.

​2. Rogue Wi-Fi Networks


hacker sets up a Wi-Fi network that looks legitimate, or perhaps even mimics a
trusted network.

3. Packet Analyzers

packet sniffers are relatively small computer programs that can monitor traffic on
a given network. They can also intercept some data packages, and provide info
about their contents. These types of programs can be used in a non-malicious
way, simply to gather data about traffic.. However, they can be used by hackers
as well.

4. Rogue Access Points

Rogue APs differ from rogue networks.. They are fairly common and often come
in the form of wireless routers. Often times, they are installed by well-meaning
employees, to give more customers access to the Wi-Fi network not configured
properly making them easy to break into, even though the network itself might
be secure.

5. Evil Twins

An evil twin is very similar to a rogue AP, but it’s much more sophisticated when
it comes to masking its purpose. Evil twins are designed to look, and act exactly
like a legitimate AP. Hackers can clone an AP you know and trust, and create
one that is identical. When you connect via this AP, you’re actually connecting to
the evil twin, which then proceeds to send info to the hacker.
6. Ad Hocs

Ad hocs are peer-to-peer to networks that connect two computers directly. They
often use the same channels as wireless connections. When using a public Wi-Fi
network, your computer is probably going to be set to discover new networks. In
this way, a malicious hacker can connect directly to your laptop, or mobile
device, if they are within range since the channels will be open to new
connections. It’s enough for one end of the Wi-Fi network to allow ad hoc
connections to give hackers access to the entire network.

7. Endpoint Attacks

Within a Wi-Fi network, each user, as well as the Wi-Fi provider are known as
endpoints. While of a lot of the Wi-Fi security threats come via the connection
itself, and the channel used to transmit data packages, the endpoints of the
connection are also vulnerable to attacks. One way hackers can access your
laptop is by setting up fake websites or landing pages that then grant them
access to the entire network. If the entry point is not your own computer, you
might not even be aware that a hacker has gained access to the network, and
thus your computer as well.

8. Worms

Worms are in many ways similar to traditional computer viruses. But they differ in
one key aspect. Computer viruses need a program to attach to so they can work.
Worms, on the other hand, can propagate by themselves. When you are
connected to a public Wi-Fi network, if you do not have proper security in place,
a worm can jump onto your computer from another device that’s connected to the
network you are using.

9. Mishandled Wi-Fi Security Set-Ups

With all of the advancements in information technology and more and more
efficient methods of hacking, to this day, ​user error is still one of the most
common threats​. When using a public Wi-Fi network, you cannot guarantee that
the employees who set up the network have taking every step necessary to
ensure data protection. It’s not uncommon for employees to just leave the default
user and password on a Wi-Fi rooter, which makes the network incredibly easy to
access.

10.​ Soft Apps

The most common soft access points are hotspots. Users sometimes forget to
turn these hotspots off, so the next time they connect to a public Wi-Fi network,
the hotspot creates a vulnerable entry point that hackers can exploit. These
hotspots can create a serious issue, even if the network is otherwise secure.

These are currently some of the most common Wi-Fi security threats. As the
means of safeguarding data against these threats will develop, it’s likely that
hackers are going to find new ways of circumventing them. Using a VPN to
prevent attacks is perhaps one of the easiest and most effective ways of
protecting your data while using a public Wi-Fi network.
IoT as an Attack Vector
In July of the same year, it was reported that seemingly benign items, such as
toasters, irons, dashboard cameras, the small appliances, cell phones, and other
electronics were found to contain a Wi-Fi chip that spread malware. Interestingly,
Russian officials, who first discovered the chips in items imported from China, found
the chips due to a small variation in the physical weight of the items rather than
through electronic means.

https://www.titanhq.com/biggest-wi-fi-ha
cks-of-2016-lessons-learnt

KEY REINSTALLATION ATTACKS


The weaknesses are in the Wi-Fi standard itself, and not in individual products or
implementations. Therefore, any correct implementation of WPA2 is likely affected.
When a client joins a network, it executes the 4-way handshake to negotiate a fresh
encryption key. It will install this key after receiving message 3 of the 4-way handshake.
Once the key is installed, it will be used to encrypt normal data frames using an
encryption protocol. However, because messages may be lost or dropped, the Access
Point (AP) will retransmit message 3 if it did not receive an appropriate response as
acknowledgment. As a result, the client may receive message 3 multiple times. Each
time it receives this message, it will reinstall the same encryption key, and thereby reset
the incremental transmit packet number (nonce) and receive replay counter used by the
encryption protocol. We show that ​an attacker can force these nonce resets by
collecting and replaying retransmissions of message 3 of the 4-way handshake​.
By forcing nonce reuse in this manner, the encryption protocol can be attacked, e.g.,
packets can be replayed, decrypted, and/or forged. The same technique can also be
used to attack the group key, PeerKey, TDLS, and fast BSS transition handshake.
https://www.krackattacks.com/

Вам также может понравиться