Chapter 4: Hijacking Wi-Fi


In This Chapter

  • Wi-Fi session hijacking

  • Spoofing explained

  • Avoiding rogue access points

  • Explaining denial of service (DoS) attacks

Crackers have a number of attack methods at their disposal when they decide to go after a WLAN. Many of these attacks require no special technical skill or knowledge; even script-kiddies can perform them. Understanding these attack methods will help you make informed security choices and determine the level of risk (and protection) for your network.

This chapter explains some of the more common and more effective attacks on Wi-Fi networks, but by no means provides a complete list of potential threats. The concepts behind many of these attacks aren’t new; some of them have been around a long time and they’ve been adapted to fit new technology. They apply to wired networks as well as wireless.




Caution. Wireless Networking. Preventing a Data Disaster
Caution! Wireless Networking: Preventing a Data Disaster
ISBN: 076457213X
EAN: 2147483647
Year: 2003
Pages: 145

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net