Description: <div style="text-align: justify;">Wireless IEEE 802.11 protocol is vulnerable to many over the air attacks. The very nature of wireless medium leaks out the signal in un-controlled fashion and physical access to the enterprise is not always necessary. This video series talks about different wireless attacks like De-authentication attack, planting rogue Access Point, client mis-association, RF jamming and many more such attacks. The videos explain the attacks along with the tools used to launch them and the possible protection technique. This video is on RF jamming. The video talks about two types of RF jamming 1. Physical layer jamming 2. Virtual jamming (Layer -2 jamming) By continuous transmission in IEEE 802.11 wireless spectrum all the legitimate devices always fell that the medium is occupied and they back off, thus launching denial of service attack.<br><br><br><style type="text/css">body { background: #FFF; } </style> </div>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.