Garuda Project

¡°Wireless Intrusion Detection System on 802.11 layer 2¡±

Contact:

Tel : +82-2-837-2010

Fax : +82-2-837-1336

e-mail : truefroggie[at]hotmail.com

Wireless Threats

¡Ü Wireless sniffing ( Monitoring)

¡Ü MAC address ppoofing against open authentication

¡Ü WEP key cracking

¡Ü MITM ( Man in the middle attack )

¡Ü War driving ( NULL Probing and AP scanning )

¡Ü Direct anonymous access

¡Ü Denial of service attack against 802.11 wireless protocol (association, authentication, etc¡¦ )

¡Ü Denial of service attack by physical signal against access point and wireless assets

¡Ü Various vulnerabilities of AP itself ( ex, input validation error  makes attacker could access  administrator¡¯s mode, configuration mode of AP )

¡Ü Unknown errors which could be occur when various type of wireless transmission test is processing ( this errors may be dependant to vendors  )

What¡¯s the Wireless Threats ?

 

 The vulnerabilities of wireless threats are based on especially draft of  IEEE 802.11. at the mention of wireless threats, a lot of specialist said ¡°this problems are caused by what it was designed for home network, though it increased  to adapt  market of enterprise environment .¡°

and following list is shown what these are in detail .

 

A List of Wireless Threats