Description: <div style="text-align: justify;">Wireless IEEE 802.11 protocol is vulnerable to many over the air attacks. The very nature of wireless medium leaks out the signal in uncontrolled fashion and physical access to the enterprise is not always necessary. This video series talks about different wireless attacks like De-authentication attack, planting rogue Access Point, client mis-association, RF jamming and many more such attacks. The videos explain the attacks along with the tools used to launch them and the possible protection technique. There are basic two modes in IEEE 802.11 wireless LAN networks for communication. 1. Infrastructure mode: Here station associates with the Access Point to get the network services. Access Point is the central entity which serves multiple stations authentication and security enforcement is the access points responsibility 2. ADHOC Mode: In this mode, every station has equal importance and there is no central entity. The security procedures and other authentication and management related decisions are not taken centrally. Due to very nature of adhoc mode, there is very little control of the wireless administrator and very high chances of security holes. If the employee keeps laptop running in adhoc mode (which is natural case, e.g. if she/he uses ADHOC at home) then, the attacker can exploit this situation and gets itself connected with the authorized machine. Here after the attacker can launch some attacks on the compromised machine or even on the enterprise subnet.<br><br>Tags: ADHOC networks, wireless attacks<br><br><br></div><style type="text/css"> body { background: #FFF; } </style>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.