Here is a complete tutorials about types of Wireless and and the Tools used for those Attacks.
Standard wireless communication occurs when the end user and the wireless access point are able to communication on a point-to-point basis without interruptions. There are many attack variations in existence against wireless networks that breaks the standard communication format. These attacks includes the denial of service attacks, the man in the middle attacks and the WEP key-cracking attack to name a few and are described below.
Access control attacks:
These attacks attempt to penetrate a network by using wireless or evading WLAN access control measures, like AP MAC filters and 802.1X port access controls.
Confidentiality attacks
These attacks attempt to intercept private information sent over wireless associations, whether sent in the clear or encrypted by 802.11 or higher layer protocols.
Integrity attacks
These attacks send forged control, management or data frames over wireless to mislead the recipient or facilitate another type of attack (e.g., DoS).
Authentication attacks
Intruders use these attacks to steal legitimate user identities and credentials to access otherwise private networks and services.
Availability attacks
These attacks impede delivery of wireless services to legitimate users, either by denying them access to WLAN resources or by crippling those resources.
Note: Many of these tools can be found in the BackTrack Auditor Security Collection, a live CD open source toolkit intended for use during penetration testing and vulnerability assessment.
No comments:
Post a Comment