Garuda Project |
¡°Wireless Intrusion Detection System on 802.11 layer 2¡± |
Contact: |
Tel : +82-2-837-2010 Fax : +82-2-837-1336 e-mail : truefroggie[at]hotmail.com |
Wireless Threats |
¡Ü Wireless sniffing ( Monitoring) ¡Ü MAC address ppoofing against open authentication ¡Ü WEP key cracking ¡Ü MITM ( Man in the middle attack ) ¡Ü War driving ( NULL Probing and AP scanning ) ¡Ü Direct anonymous access ¡Ü Denial of service attack against 802.11 wireless protocol (association, authentication, etc¡¦ ) ¡Ü Denial of service attack by physical signal against access point and wireless assets ¡Ü Various vulnerabilities of AP itself ( ex, input validation error makes attacker could access administrator¡¯s mode, configuration mode of AP ) ¡Ü Unknown errors which could be occur when various type of wireless transmission test is processing ( this errors may be dependant to vendors ) |
What¡¯s the Wireless Threats ?The vulnerabilities of wireless threats are based on especially draft of IEEE 802.11. at the mention of wireless threats, a lot of specialist said ¡°this problems are caused by what it was designed for home network, though it increased to adapt market of enterprise environment .¡° and following list is shown what these are in detail .
|
A List of Wireless Threats |