Summary


In this chapter I introduced some of the methods that a cracker might use when attacking your WLAN. These included:

  • How a cracker might hijack a user’s Wi-Fi session

  • How crackers use spoofing to gain access to wireless networks

  • What rogue access points are, and how crackers use them to steal user logon information

  • Denial of service (DoS) attacks, including how crackers use them to disrupt wireless networks

These are just some of the attacks that are possible against wireless networks. In the next chapter, I will present some others, including attacks that target WLAN clients like your notebook or even your PDA.




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net