Description: <div style="text-align: justify;">Wireless IEEE 802.11 protocol is vulnerable to many over the air attacks. The very nature of wireless medium leaks out the signal in un-controlled fashion and physical access to the enterprise is not always necessary. This video series talks about different wireless attacks like De-authentication attack, planting rogue Access Point, client mis-association, RF jamming and many more such attacks. The videos explain the attacks along with the tools used to launch them and the possible protection technique. This video is on Rogue Access Points. Any access point that is connected to the enterprise Ethernet jack without the administrator’s knowledge is a rogue access point. This can be intentionally planted access point by the malicious attacker or just an accidental insertion by any employee. Rogue AP opens up serious security holes in enterprise the security. Since there is no control of administrator on rogue AP’s security and filter settings, it completely compromises the network. This video talks more about the rogue AP attack and its possible solutions.<br><br>Tags: Rogue AP, wireless attacks<br><br><br></div><style type="text/css"> body { background: #FFF; } </style>
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.