Wireless Security. Objective:. Understand the benefits of a wireless network Understand security risks Examples of vulnerabilities Methods to protect your network. Benefits of a Wireless Network. Can be an extension to a wired LAN Wired LANs can be at time, impractical, or impossible
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Wireless attacks fall under 4 main categories:
WI FI nodes
MAC Authentication SpoofingMost Wi-Fi WLAN equipment vendors include a sublevel of rudimentary authentication via MAC address white/black listing. Standard tools can "spoof" MAC addresses which allow any attacker to mask himself/herself as an authorized client thereby gaining access to the WLAN.
If a client can be tricked into connecting to a malicious AP then it may become vulnerable in a number of ways: (a) it may accept an unencrypted connection, (b) the malicious AP might be used as part of a man-in-the-middle attack, (c) the user might be tricked by phishing attacks behind the AP (e.g. a fake hotspot signup page).
Falling victim to an insertion attack can prove to be costly.
Use Static IP addresses
From a corporate standpoint:
Firewalls, encryptions, properly placed APs, MAC filtering, etc.