Presentation is loading. Please wait.

Presentation is loading. Please wait.

Wireless Spoofing Attacks on Mobile Devices

Similar presentations


Presentation on theme: "Wireless Spoofing Attacks on Mobile Devices"— Presentation transcript:

1 Wireless Spoofing Attacks on Mobile Devices
By: Leon Antony IASP -470 Professor Dr.Yoon

2 Introduction Millions of people connect to free Wi-Fi without knowing the risk. On mobile devices the auto – connect feature is always on searching for a network with no authentication to connect. Not every network that is broadcast on Wi-Fi on the mobile device is secure and official. This spoofing method is just another tool trick the victim into joining their network.

3 Definition of Spoofing
The word spoof is defined as to trick, hoax and deceive someone. This is also true as a network security term but in more detail. Spoofing is illegal practice in which communication is sent from unknown source disguised as source known to the receiver.

4 The Types of Spoofing Attacks IP Spoofing
IP spoofing-attack sends IP packets from a fake source address to hide itself. The first method is to send multiple packs to the victim which the victim is unable to handle. The other method is mimicking the IP address of the target and sending multiple packets to multiple recipients on the network.

5 The Types of Spoofing Attacks DNS Spoofing
In a Domain Name System attack the attack controls and modifies the DNS server in order to reroute the user accessing a specific domain name to a different IP address. The DNS server attacks used to spread computer worms and viruses changing DNS server of common URLs, addresses and other domain names.

6 The Types of Spoofing Attacks ARP Spoofing
An ARP Spoofing attack is data intended for the host IP address getting sent to the attacker instead. This is accomplished by hacker sending spoof ARP messages across the Host network in order to link the attack MAC address with a member of the current local network

7 Accessing Spoofing Network
1. Capture your account’s user ID and passwords. 2. Log the data of online traffic accessed on your phone or computer. In this way, they can maintain a data of the websites you mostly visit, and plan attack from these websites. 3. Gain access to your computer, its network and data. 4. Launch a spam or malware attack on your device. 5. Hijack the account you are logged into, and use it for unscrupulous purpose. 6. Redirect you to a phishing webpage where you might give away your personal information.

8 Solution Packet filters inspects the transmitted packets over the network which allows it block packets with conflicting address. Transport Layer Security (TLS), Secure Shell(SSH) and HTTP Secure(HTTPS) will prevent spoofing attacks by encrypting data before it is sent and authenticating the data as it is received.

9 Conclusion “Spoofing is a global issue, though American organizations are key targets. U.S. controlled internet protocol addresses are responsible for 25 to 29 percent of known spoofing attacks”. When an individual connects to WI-FI you should be cautious. An example of this is when individual go to a public place like a library or Starbucks which encourages people to use their Wi-Fi. Users typically use the same username and password for many things and when Wi-Fi is available requires a new account hackers can abuse it. If this is the case always create unique username and password and never provide personal information.


Download ppt "Wireless Spoofing Attacks on Mobile Devices"

Similar presentations


Ads by Google