Skip to content
This repository has been archived by the owner on Sep 8, 2021. It is now read-only.

Latest commit

 

History

History

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 

3.2 Given a scenario, research attack vectors and perform wireless attacks

Attack methods

Eavesdropping

An eavesdropping attack, also known as a sniffing or snooping attack, takes advantage of unsecured network communications to access data and theft information as it is being sent or received by its user.

Data modification

A simple modification of the data transmitted over the network.

Data corruption

Corruption of the data transmitted over the network, like removing bytes, changing headers, etc.

Relay attacks

Type of hacking technique related to man-in-the-middle and replay attacks. In a classic relay attack, the attacker initiates communication with both parties who then merely relays messages between the two parties without manipulating them or even necessarily reading them.

:::image type="content" source="../assets/relay_attack.jpg" alt-text="Relay attack applies to cars equipped with smart keys.":::

Spoofing

Deauthentication

Jamming

Capture handshakes

On-path

d94dbb976ce5ff2adc191fe043721eb93ebf0fb7

On-path, also know as man-in-the-middle attack, is a type of eavesdropping. Can be performed in a wireless network with ARP Spoofing and others techniques.

[!VIDEO https://www.youtube.com/embed/GVu91EISH_M]

Attacks

  • Evil twin

  • Captive portal

  • Bluejacking

  • Bluesnarfing

  • Radio-frequency identification (RFID) cloning

  • Bluetooth Low Energy (BLE) attack

  • Amplification attacks [Near-field communication (NFC)]

  • WiFi protected setup (WPS) PIN attack

Tools

  • Aircrack-ng suite

  • Amplified antenna