Systems and Security : Attacks, Threats, and Vulnerabilities
1.4 Wireless Attacks and It's Indicators
Wireless attacks are security breaches that occur on wireless networks and devices. Some common types of wireless attacks include:
Evil twin: This is when a malicious actor creates a fake wireless access point that looks identical to a legitimate one. The attacker uses this access point to intercept sensitive information transmitted over the network.
Rogue access point: This is an unauthorized wireless access point that has been installed on a network. Rogue access points can be used to steal sensitive information or launch attacks on the network.
Bluesnarfing: This is a type of Bluetooth attack where an attacker accesses and steals information from a target's Bluetooth-enabled device.
Bluejacking: This is a less malicious form of Bluetooth attack where an attacker sends unsolicited messages to nearby Bluetooth-enabled devices.
Disassociation: This is an attack where an attacker sends disassociation packets to a wireless network, disconnecting legitimate users from the network.
Jamming: This is an attack where an attacker sends disruptive signals to a wireless network, causing it to stop functioning.
Radio frequency identification (RFID) and near-field communication (NFC) attacks: These attacks target wireless technologies used for contactless payment systems and other applications.
NFC (Near-field communication) is a technology for short-range wireless data exchange. It allows for communication between two devices that are close to each other, typically less than 10 cm apart. In an NFC attack, the attacker seeks to exploit vulnerabilities in the communication between the two devices in order to access sensitive information or take control of one of the devices.