Академический Документы
Профессиональный Документы
Культура Документы
1. Packet Sniffing
2. Rouge Access Point
3. Man in the Middle Attack
4. Jamming
5. War Driving
6. Bluetooth Attacks
7. WEP/WPA Attacks
8. Password Theft
https://phoenixts.com/blog/types-of-wireless-network-attacks/
https://www.safervpn.com/blog/10-public-wi-fi-security-threats/
1. Man-in-the-Middle
hackers intercept data packages as they travel between victims.. Attackers will
intercept messages between two users who believe they are talking directly to
one another. Connections without authentication protocols are victims.
3. Packet Analyzers
packet sniffers are relatively small computer programs that can monitor traffic on
a given network. They can also intercept some data packages, and provide info
about their contents. These types of programs can be used in a non-malicious
way, simply to gather data about traffic.. However, they can be used by hackers
as well.
Rogue APs differ from rogue networks.. They are fairly common and often come
in the form of wireless routers. Often times, they are installed by well-meaning
employees, to give more customers access to the Wi-Fi network not configured
properly making them easy to break into, even though the network itself might
be secure.
5. Evil Twins
An evil twin is very similar to a rogue AP, but it’s much more sophisticated when
it comes to masking its purpose. Evil twins are designed to look, and act exactly
like a legitimate AP. Hackers can clone an AP you know and trust, and create
one that is identical. When you connect via this AP, you’re actually connecting to
the evil twin, which then proceeds to send info to the hacker.
6. Ad Hocs
Ad hocs are peer-to-peer to networks that connect two computers directly. They
often use the same channels as wireless connections. When using a public Wi-Fi
network, your computer is probably going to be set to discover new networks. In
this way, a malicious hacker can connect directly to your laptop, or mobile
device, if they are within range since the channels will be open to new
connections. It’s enough for one end of the Wi-Fi network to allow ad hoc
connections to give hackers access to the entire network.
7. Endpoint Attacks
Within a Wi-Fi network, each user, as well as the Wi-Fi provider are known as
endpoints. While of a lot of the Wi-Fi security threats come via the connection
itself, and the channel used to transmit data packages, the endpoints of the
connection are also vulnerable to attacks. One way hackers can access your
laptop is by setting up fake websites or landing pages that then grant them
access to the entire network. If the entry point is not your own computer, you
might not even be aware that a hacker has gained access to the network, and
thus your computer as well.
8. Worms
Worms are in many ways similar to traditional computer viruses. But they differ in
one key aspect. Computer viruses need a program to attach to so they can work.
Worms, on the other hand, can propagate by themselves. When you are
connected to a public Wi-Fi network, if you do not have proper security in place,
a worm can jump onto your computer from another device that’s connected to the
network you are using.
With all of the advancements in information technology and more and more
efficient methods of hacking, to this day, user error is still one of the most
common threats. When using a public Wi-Fi network, you cannot guarantee that
the employees who set up the network have taking every step necessary to
ensure data protection. It’s not uncommon for employees to just leave the default
user and password on a Wi-Fi rooter, which makes the network incredibly easy to
access.
The most common soft access points are hotspots. Users sometimes forget to
turn these hotspots off, so the next time they connect to a public Wi-Fi network,
the hotspot creates a vulnerable entry point that hackers can exploit. These
hotspots can create a serious issue, even if the network is otherwise secure.
These are currently some of the most common Wi-Fi security threats. As the
means of safeguarding data against these threats will develop, it’s likely that
hackers are going to find new ways of circumventing them. Using a VPN to
prevent attacks is perhaps one of the easiest and most effective ways of
protecting your data while using a public Wi-Fi network.
IoT as an Attack Vector
In July of the same year, it was reported that seemingly benign items, such as
toasters, irons, dashboard cameras, the small appliances, cell phones, and other
electronics were found to contain a Wi-Fi chip that spread malware. Interestingly,
Russian officials, who first discovered the chips in items imported from China, found
the chips due to a small variation in the physical weight of the items rather than
through electronic means.
https://www.titanhq.com/biggest-wi-fi-ha
cks-of-2016-lessons-learnt