Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Wireless Hacking
#1

Wireless local area networks also called WLAN or Wi-Fi are widespread these days. They offer convenience, mobility, and can even be less expensive to implement. Wireless networks are based on the IEE 802.11 set of standards for WLANs.IEE 802.11 working group and the Wi-Fi Alliance are working at developing WLANs.

Wireless Hacking
physical security weaknesses, encryption flaws,
and authentication problems, have been discovered in the wireless networks.
Wi-Fi Protected Access (WPA): of Wi-Fi Alliance, and IEE 802.11i (referred to as WPA2) of IEE are developed for defending against attackers.
Risks associated with vulnerable wireless networks are:
-Full access to files being transmitted
-Intercepted e-mails
-Stolen passwords
-Denial-of-service attacks
-Back-door entry points
-Spamming
-Zombies: A hacker using your system to attack other networks

The various kinds of attacks mounted in wireless hacking are:
1)Non-technical attacks
These exploit human weaknesses, like the lack of
awareness, carelessness, and being too trusting of strangers. Often the easiest. These attacks include:
-Social engineering attacks whereby hackers disguise and get out too much information from you about your network.-
-Breaking into unsecured wireless devices
-Physically accessing APs, antennae, and other wireless infrastructure
equipment to reconfigure it

2)Network attacks
These include:
-Jamming RF signals
-Capturing data off the network from a distance
-Installing rogue wireless APs
-Exploiting network protocols such as SNMP
-denial-of-service (DoS) attacks
-Attacking the networking transactions by spoofing MAC addresses

3)Software attacks
-Hacking the operating system and other applications on wireless-client
machines
-Cracking WEP keys and entering network's security system
-Breaking in via passwords and SSIDs
-exploiting weak network-authentication systems and gaining acces

full seminar report can be obtained from this link:
http://media.wileyproduct_data/excerpt/0...597302.pdf
Reply

#2
Hi,
visit the thread http://seminarsprojects.net/Thread-Wireless-Hacking
for wireless hacking details.
Reply

#3
Wireless Hacking
ON THIS TOPIC PLEASE SEND ME THE FULL REPORT ON ID
[email protected]
Reply



Forum Jump:


Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.