CompTIA Security+ Study Guide (SY0-501) Chapter 5: Wireless Network Threats
Chapter 5: Wireless Network Threats Compare and contrast types of attacks
Wireless Vulnerabilities Wireless systems are vulnerable to all the different attacks that wired networks are vulnerable to. All radio frequency signals can be easily intercepted.
Wireless Vulnerabilities Replay Rogue access points Any wireless access point added to your network that has not been authorized is considered a rogue. Evil twin attack This is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information users transmit.
Wireless Vulnerabilities Continued Jamming WPS Bluejacking The sending of unsolicited messages (think spam) over the Bluetooth connection Bluesnarfing The gaining of unauthorized access through a Bluetooth connection
Wireless Vulnerabilities Continued NFC and RFID Disassociation The intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.