Because wireless networks do not require physical network access, they can be especially vulnerable to hacking attempts. A number of attacks or vulnerabilities may affect wireless networks. This section will cover the following topics:
- Rogue access points
- Interference
- Evil twin
- Wardriving
- Bluejacking
- Bluesnarfing
- Warchalking
- IV attack (WEP)
- Packet sniffing
Rogue Access Points
A rogue access point is any unauthorized wireless access point on a network. In the absence of network access control protocols, adding an unauthorized wireless access point . . .
The content below this message is for members only.