20
Wirel ess Intrusi on Techniq ues

Wireless Intrusion Techniques

  • Upload
    cadis1

  • View
    262

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Wireless Intrusion Techniques

Wireless Intrusio

n Techniques

Page 2: Wireless Intrusion Techniques

Overview Introduction Common wireless intrusion techniques Eavesdropping IP Spoofing Attack Data Manipulation Attack Password-Based Attack Man in the Middle Attack Denial-of-Service Attack Compromised-Key Attack Application-Layer Attack

Page 3: Wireless Intrusion Techniques

Introduction

Wireless intrusion techniques are the methods by which intruder gains access to the wireless network.

Intruder can modify, steal, save or delete the data.

Page 4: Wireless Intrusion Techniques

In general, the majority of network communications occur in an unsecured or "cleartext" format.

Eavesdropping

Allows an attacker who has gained access to data paths and to "listen" the traffic.

When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping.

Page 5: Wireless Intrusion Techniques

• It is generally the biggest security problem that administrators face in an enterprise.

Eavesdropping

• Without strong encryption your data can be read by others.

Page 6: Wireless Intrusion Techniques

IP Spoofing

Lying about the source address lets an attacker assume a new identity.

With a valid IP address, the attacker can modify, reroute, or delete your data.

Normally, the source address is incorrect.

Basically, IP spoofing is lying about an IP address.

Page 7: Wireless Intrusion Techniques

IP Spoofing

Page 8: Wireless Intrusion Techniques

Data Manipulation

• Attacker can modify the data in the packet without the knowledge of the sender or receiver.

• An attacker has read your data, the next logical step is to alter it.

• For Example : Attacker can change the item details, amount, or billing information.

Page 9: Wireless Intrusion Techniques

Password Based Attack• A common denominator of most operating system and network security plans is password-based access control.

• When an attacker finds a valid user account, the attacker has the same rights as the real user.

• If the user has administrator-level rights, the attacker also can create accounts for subsequent access at a later time.

Page 10: Wireless Intrusion Techniques

Password Based Attack

After gaining access to your network with a valid account, an attacker can do any of the following:

•Obtain lists of valid user and computer names and network information.

•Modify server and network configurations, including access controls and routing tables.

•Modify, reroute, or delete your data.

Page 11: Wireless Intrusion Techniques

Man in the Middle

A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages

between two parties who believe they are communicating directly with each other.

Page 12: Wireless Intrusion Techniques

Man in the Middle Attack

Graphic representation of MITM attack

Page 13: Wireless Intrusion Techniques

Denial-of-Service Attack

Unlike a password-based attack, the denial-of-service attackprevents normal use of your computer or network by valid users.

Page 14: Wireless Intrusion Techniques

Denial-of-Service Attack

After gaining access to your network, the attacker can do any of the following:

Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services.

Flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

Block traffic, which results in a loss of access to network resources by authorized users.

Page 15: Wireless Intrusion Techniques

Compromised-Key Attack

A key is a secret code or number necessary to interpret secured information.

Page 16: Wireless Intrusion Techniques

Compromised-Key Attack

Obtaining key is a difficult task but if attacker obtain the key, that key is referred as Compromised Key.

The attacker can decrypt or modify data and can use the compromised key to compute additional keys.

Which might allow the attacker access to other secured communications.

Page 17: Wireless Intrusion Techniques

Application Layer Attack

• An application-layer attack targets application

servers by deliberately causing a in a server's

operating system or applications.

• The fault is results in the attacker gaining the

ability to bypass normal access controls.

Page 18: Wireless Intrusion Techniques

Application Layer Attack

Page 19: Wireless Intrusion Techniques

Application Layer AttackThe attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following:

• Read, add, delete, or modify your data or operating system.

• Introduce a virus program that uses your computers and software applications.

• Introduce a sniffer program to analyze your network and gain.

• Abnormally terminate your data applications or operating systems.

• Disable other security controls to enable future attacks.

Page 20: Wireless Intrusion Techniques

Thank you