A plethora of attack vectors
Wireless is a great technology. So, how do we evaluate the threats, or the possibility of threats, that we expose our networks to?
Let's look at some of the integrity attacks you could be a victim of. They can be summed up in several different categories.
Access control attacks
These types of attacks are designed to gain access to your network without your wireless security solutions detecting them or being able to bypass them altogether:
- Wardriving – This is basically driving around and using a device to search for the web beacons; these are little packets in the air that make it so your authorized devices know they're in range of your SSID. I personally use PassMark's WirelessMon, but other tools include Kismet, inSSIDer, and the classic NetStumbler.
- Rogue APs – We'll dive into this one a little later, but, for now, let's just describe them as unauthorized APs that a hacker brings into your...