Captured data that is later reused to impersonate...just like the wired version, but much easier to capture data because the WAP is "in the clear" - like tuning into a radio station; WEP security is a big danger for this
. Someone creates a wifi access point on your network; protect by using NAC 802.1X which forces authentication no matter what
. Someone creates a wifi access point on your network with the exact same SSID and configuration as the "real" one; big risk at open networks like hotels and coffee shops
. Filling up the wireless radio signal by loading it up with "noise" so it can't find the "real" signal; a type of DoS, but could be unintentional like a microwave
. Old way of connecting and authenticating to Wireless Access Points that was too easy to crack with brute force - never use it due to a design flaw
. Sending unsolicited messages over bluetooth
. Actually accessing somoneone's mobile device data over bluetooth
. Radio connection mode that can be jammed causing a DoS, can be spoofed, or can have data captured (replay attack)
. Mode often used in payment systems that has similar threats seen in RFID
. DoS attack where the wireless access point is working, then not, then working again, then it's not; caused by hacking the 802.11 management frames being "disassociated"
.
|