Wireless Security-Attacks & Risk

Wireless Security is always be a concern and in Wi-Fi Technology Security will play an important role in corporate network. As we all know that Wi-Fi works on signal strength, and we can not control the signal to spread. So, it is very easy to connect with your Wi-Fi network and hack your network if you do not have strong Security on Wireless network.

(Disclaimer : This blog is only for educational and informational Purpose only. We believes that everyone is aware about technology, Security, Ethical Hacking, Cyber Security and how to avoid such risks. All our blogs have been made using our own knowledge, experience, server, lab etc. It does not contain any illegal activities. Our sole purpose is to share our knowledge only. Any related word, things, activity, example are simply coincidence only. Kbrosis Technologies is not responsible for misuse of provided information).

Wireless Security-Attacks & Risk
Wireless Security-Attacks & Risk

Wireless Security – Client Mis association 

Sometime you have observed that you get connected with Wi-Fi network automatically whenever you are in range because you have connected once with that network and your information are already added and stores this list in the so-called Preferred Network List (in a windows world).

A malicious hacker may use this default behaviour, and bring its own wireless AP to the physical area, where you are normally using your Wi-Fi. If the signal from that AP, would be better than the one from original AP, the laptop software will mis-associate to the fake (rogue) access point provided by the hacker (thinking it is the legitimate AP, you have used in the past). These kind of attacks are very easy to perform in some big open spaces, such as airports, office environments or public areas. These kind of attacks are sometimes referred to as Honeypot AP Attacks.

Ad-Hoc Connection Attack 

Ad-Hoc Connection attacks are very nasty type of attacks, where the attacker (malicious user) is using a 3rd party legitimate user as an additional hop or man-in-the-middle between attacker’s device and AP or other type of gateways. 

For Warless Security Basic, DDOS Attack, Rough AP and Clean Air technology –please read-https://techblog.kbrosistechnologies.com/wireless-security-attacks-risk/?preview=true

Wireless Security – Launch Wireless Attacks 

All kinds of wireless attacks may be divided into 2 categories − Passive Attacks and Active Attacks.

Passive attacks do not require to install rogue AP or inject any traffic. they are just hiding and listening to radio frequencies.

Examples of Passive Attacks 

Let us now take a look at some of the examples of passive attacks −

  • Breaking WEP Encryption

Behind the scenes to break a WEP encryption, one has to sniff a large volume of data packets. The next step is to get the same IV vector inside the wireless frames, and the last step is to break the WEP encryption model offline. There is no single step in the attack that requires the attacker to communicate with victim in any way.

  • Breaking WPA/WPA2 Encryption

To break a WPA/WPA2 encryption, one needs to sniff EAP 4-way handshake between a wireless client and the AP. Afterwards, an offline dictionary (or offline brute-force attack) is conducted on the collected encrypted packets.

  • Sniffing the traffic between communicating parties

If users were not using any protocols that is natively using encryption (for example cleat text HTTP),then hackers are free to see what the user was doing and track his moves on the internet.

Active attacks on the other hand are the ones, that require active participation in the wireless traffic forwarding or in injection of the wireless frames that affects WLAN operation.

To read more about WPA, WPA2, WPA3 Please visit-https://techblog.kbrosistechnologies.com/wireless-security-protocols/

Examples of Active Attacks

Here are some example of active attacks –

  • Injection of Wireless Traffic− A classic example of Layer 2 DoS, used by flooding of de-authentication frames. .
  • Jamming Attacks− As you remember, this is a type of Layer 1 DoS attack. Jamming devices are used to create interferences with a valid RF of Wi-Fi network, thus leading to WLAN service degradation.
  • Man-in-the-Middle Attack− The attacker is equipped with two wireless network cards and may use one of them to connect to the original AP as the client; and use the second wireless card to broadcast some fake SSID using software emulating AP

Wireless Security Options:

Types of Wireless Security Encryption Protocols:

Wireless security encryption is mainly divided into four main types:

  • Wired Equivalent Privacy Protocol (WEP)
  • Wi-Fi Protected Access Protocol (WPA)
  • Wi-Fi Protected Access 2 Protocol (WPA2)
  • Wi-Fi Protected Access 3 Protocol (WPA3
  • 802.1X Authentication WITH The EAP Process

Visit to our site : https://www.kbrosistechnologies.com/

Watch more Video  https://www.youtube.com/channel/UCpcd6IshE1caAbf9EdJd3gw 

https://www.youtube.com/channel/UCTbOmLTSlHggEBkt5wFGNRA

FAQ

Q. What is wireless security?
A. Wireless security refers to protect your corporate LAN network from wireless networks and devices from unauthorized access, data theft, and other security threats.

Q. Why is wireless security important?
A. Wireless Security is always be a concern and in Wi-Fi Technology Security will play an important role in corporate network. As we all know that Wi-Fi works on signal strength, and we can not control the signal to spread. So, it is very easy to connect with your Wi-Fi network and hack your network if you do not have strong Security on Wireless network..

Q. What are the common threats to wireless networks?
A. It include
Unauthorized access,
Rogue access points,
Denial-of-service attacks (DOS), and
Man-in-the-middle attacks.

Q. How can I secure my wireless network?
A. To protect and secure your wireless network, :
1. Update /Change username and password frequently.
2. Use encryption (such as WPA2 or WPA3)
3. Use a strong, unique Wi-Fi password.
4. Disable SSID broadcasting to make your network less visible.
5. Enable MAC address filtering to allow only authorized devices to connect.
6. Keep your WLC or Warless hardware firmware up to date.

Please Share