0% found this document useful (0 votes)
15 views

Attacks On Wireless Networks

Uploaded by

Kasi Harsha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Attacks On Wireless Networks

Uploaded by

Kasi Harsha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

ATTACKS ON

WIRELESS NETWORKS

K Harshadeep reddy
21011A0519
INTRODUCTION TO WIRELESS
NETWORKS
• Wireless networks enable convenient access to the internet,
connecting devices without physical cables.
• Eg: WLAN, WPAN, WMAN, WWAN
• Wireless networks consist of access points, routers, and devices
that communicate wirelessly.
WIRELESS NETWORK ATTACKS

• Wireless communication is prone to attacks due to broadcast


nature.
• Malicious actions aimed at exploiting vulnerabilities in wireless
communication system
• These attacks target weakness in protocols/configuration or
encryption mechanism of wireless network
• Hence Ensuring security is essential as more devices connect
wirelessly.
TYPES OF ATTACKS
• 1. Eavesdropping(sniffing):
• an unauthorized individual intercepts and reads the traffic
over a wireless network.
• Impact: Sensitive information such as passwords, credit card
numbers, or personal data can be stolen.
• Tools: Wireshark, Aircrack-ng etc.
• 2. Spoofing:
• masquerade oneself as a legitimate entity to gain
unauthorized access to a service.
• MAC address Spoofing, IP Spoofing, Frame Spoofing.
TYPES OF ATTACKS
• 3. Man-In-The-Middle (MITM) attack:
• an attacker secretly intercepts and relays communication
between two parties.
• The attacker makes independent connections with the victims
and relays messages between them, making them believe they
are talking directly to each other over a private connection, when
in fact the entire conversation is controlled by the attacker.
• Impact: Data theft, session hijacking, or altering communication.
• 4. Denial of Service (DoS) Attack:
• The attacker floods the wireless network with unnecessary traffic,
disrupting legitimate users.
• Impact: Network unavailability and service disruption.
TYPES OF ATTACKS

• 5. Rogue Access Point:


• An attacker sets up an unauthorized AP on the network to trick
users into connecting.
• Impact: Credential theft, data interception, and malware
injection.
• 6. Evil Twin Attack:
• an attacker setting up a rogue wireless access point that mimics
or impersonates a legitimate one.
• The attacker configures a device to act as a wireless access
point, often using a common network name (SSID)
TYPES OF ATTACKS

• 7. Encryption cracking:
• WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected
Access) are encryption protocols designed to secure wireless
networks.
• The attackers always devise new tools and techniques to
deconstruct the older encryption technology.
• Hence, it is better to use a long and highly randomized
encryption key
PREVENTIVE MEASURES
• Use strong encryption (WPA2/3).
• Change the default configurations of all networking devices
• Change the default SSID
• Use complex and unique passwords for the network and devices.
• Implement a firewall to filter incoming and outgoing traffic,
blocking unauthorized access
• Periodic and regular monitor wireless network security
• Deploy Intrusion Detection Systems (IDS).
• Disable SSID broadcast
• Enable MAC address filtering.
CONCLUSION

• Wireless networks are convenient but vulnerable.


• Constant updates are required to tackle new attacks.
• Encourage safe practices like encryption and VPN use.

You might also like