Sunday, October 4, 2009

Anatomy of attacks against the WLAN | WiFi

An intruder can penetrate into the system using some free program can be easily obtained on the internet. It can even conquer a wireless network in just a few steps sequence. In the attack, he can do a mass removal of the entire eye on network devices.

Here are some common things done by Attacker to conquer a wireless network (Wifi):

1. Tracking a signal from a distance using a wireless network card
using an additional antenna outside the room.

2. Being anonymous strangers using a firewall, comes from
Microsoft products or other devices such as ZoneAlarm from Zone Labs
to protect the computer from the scanner through the IDS (Intrusion
Detection System).

3. Obtain IP Address, the target access point, and DHCP server
(Dynamic Host Configuration Protocol) using applications such as
NetStumbler or other wireless client programs.

4. Exploiting vulnerabilities in wireless networks with kelamahan
ways that are not much different from that done by the intruder
networks in general. Attacker usually targeted by
common errors, such as: the default IP, the default password,
etc.

5. With the help of protocol analyzer tool, intruders do Sniff
air waves, taking a sample of the data in it, and
find MAC Address and a valid IP address that can be reached.

6. Steal important data from the traffic broadcast to map
target tissue.

7. Using devices such as Ethereal to open data
obtained from transparent protocols such as Telnet, POP (Post
Office Protocol) or HTTP (HyperText Transfer Protocol) to
seeking authentication data such as username and password.

8. Using another program, such as SMAC, to conduct spoofing
MAC Address and catch more data packets in
network.

9. WLAN to connect to the target.

10. Checking whether he has got IP address or not. This
intruder is done passively making it very difficult to detect.

11. Using the scanner system and network weaknesses for
found weaknesses in the users computers, access
point, or other devices.

12. Network exploration to map and
extend Medical Academy to the next Wireless network.

0 comments:

Post a Comment

 

ARTICLE GROUP