SlideShare a Scribd company logo
1 of 20
Overview
 Introduction
 Common wireless intrusion techniques
 Eavesdropping
 IP Spoofing Attack
 Data Manipulation Attack
 Password-Based Attack
 Man in the Middle Attack
 Denial-of-Service Attack
 Compromised-Key Attack
 Application-Layer Attack
Introduction
Wireless intrusion techniques are the
methods by which intruder gains access
to the wireless network.
Intruder can modify, steal, save or
delete the data.
 In general, the majority of network communications
occur in an unsecured or "cleartext" format.
Eavesdropping
 Allows an attacker who
has gained access to data
paths and to "listen" the
traffic.
 When an attacker is eavesdropping on your
communications, it is referred to as sniffing or
snooping.
• It is generally the biggest security
problem that administrators face in an
enterprise.
Eavesdropping
• Without strong encryption your data
can be read by others.
IPSpoofing
 Lying about the source address lets an
attacker assume a new identity.
 With a valid IP address, the attacker can
modify, reroute, or delete your data.
 Normally, the source address is
incorrect.
 Basically, IP spoofing is lying about an IP
address.
IPSpoofing
Data Manipulation
• Attacker can modify the data in the packet
without the knowledge of the sender or
receiver.
• An attacker has read your data, the next
logical step is to alter it.
• For Example : Attacker can change the item
details, amount, or billing information.
Password Based Attack
• A common denominator of most operating system
and network security plans is password-based
access control.
• When an attacker finds
a valid user account, the
attacker has the same
rights as the real user.
• If the user has administrator-level rights, the
attacker also can create accounts for subsequent
access at a later time.
Password Based Attack
After gaining access to your network with a valid account,
an attacker can do any of the following:
•Obtain lists of valid user and computer names and network
information.
•Modify server and network configurations, including access
controls and routing tables.
•Modify, reroute, or delete your data.
Man in the Middle
A man-in-the-middle attack is one in which the
attacker secretly intercepts and relays messages
between two parties who believe they are
communicating directly with each other.
Man in the Middle Attack
Graphic representation of MITM attack
Denial-of-Service Attack
Unlike a password-based attack, the denial-of-service attack
prevents normal use
of your computer or
network by valid
users.
Denial-of-Service Attack
After gaining access to your network, the attacker can do
any of the following:
Send invalid data to applications or network services,
which causes abnormal termination or behavior of the
applications or services.
Flood a computer or the entire network with traffic
until a shutdown occurs because of the overload.
Block traffic, which results in a loss of access to
network resources by authorized users.
Compromised-Key Attack
A key is a secret code or number necessary to
interpret secured information.
Compromised-Key Attack
 Obtaining key is a difficult task but if attacker
obtain the key, that key is referred as
Compromised Key.
 The attacker can decrypt or modify data and can
use the compromised key to compute additional
keys.
 Which might allow the attacker access to other
secured communications.
Application Layer Attack
• An application-layer attack targets application
servers by deliberately causing a in a server's
operating system or applications.
• The fault is results in the attacker gaining the
ability to bypass normal access controls.
Application Layer Attack
Application Layer Attack
The attacker takes advantage of this situation, gaining control of your
application, system, or network, and can do any of the following:
• Read, add, delete, or modify your data or operating system.
• Introduce a virus program that uses your computers and software
applications.
• Introduce a sniffer program to analyze your network and gain.
• Abnormally terminate your data applications or operating systems.
• Disable other security controls to enable future attacks.
Wireless Intrusion Techniques

More Related Content

What's hot

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
priya_trehan
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
Gopal Rathod
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
andynova
 

What's hot (20)

Security Mechanisms
Security MechanismsSecurity Mechanisms
Security Mechanisms
 
Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575Ethical hacking-ppt-download4575
Ethical hacking-ppt-download4575
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Security
SecuritySecurity
Security
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Mitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed ProgrammerMitre ATTACK and the North Korean Regime-Backed Programmer
Mitre ATTACK and the North Korean Regime-Backed Programmer
 
MITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB IndictmentMITRE ATT&CK and 2017 FSB Indictment
MITRE ATT&CK and 2017 FSB Indictment
 
System Security enviroment in operating system
System Security enviroment in operating system System Security enviroment in operating system
System Security enviroment in operating system
 
Intruders
IntrudersIntruders
Intruders
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Mobile security
Mobile securityMobile security
Mobile security
 
What is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in itWhat is Cryptography and Types of attacks in it
What is Cryptography and Types of attacks in it
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ frameworkMapping the ASD Essential 8 to the Mitre ATTACK™ framework
Mapping the ASD Essential 8 to the Mitre ATTACK™ framework
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
Ppt.1
Ppt.1Ppt.1
Ppt.1
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 

Viewers also liked (9)

Nick D'Aloisio Presentation
Nick D'Aloisio PresentationNick D'Aloisio Presentation
Nick D'Aloisio Presentation
 
La sociedad del conocimiento
La sociedad del conocimientoLa sociedad del conocimiento
La sociedad del conocimiento
 
Wow simplifying ppt show winter 2013b
Wow simplifying ppt show winter 2013bWow simplifying ppt show winter 2013b
Wow simplifying ppt show winter 2013b
 
TechnologyOne_Andrew Szekeres CV v1.0_2015
TechnologyOne_Andrew Szekeres CV v1.0_2015TechnologyOne_Andrew Szekeres CV v1.0_2015
TechnologyOne_Andrew Szekeres CV v1.0_2015
 
Ijasah S1
Ijasah S1Ijasah S1
Ijasah S1
 
Tangshan Earthquake
Tangshan EarthquakeTangshan Earthquake
Tangshan Earthquake
 
Learning Product Development Process at Red Chip Solutions
Learning Product Development Process at Red Chip SolutionsLearning Product Development Process at Red Chip Solutions
Learning Product Development Process at Red Chip Solutions
 
Preparacion pte(1)
Preparacion pte(1)Preparacion pte(1)
Preparacion pte(1)
 
[Vnmath.com] he thong kien toan thcs dai so va hinh hoc
[Vnmath.com] he thong kien toan thcs dai so va hinh hoc[Vnmath.com] he thong kien toan thcs dai so va hinh hoc
[Vnmath.com] he thong kien toan thcs dai so va hinh hoc
 

Similar to Wireless Intrusion Techniques

SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 

Similar to Wireless Intrusion Techniques (20)

Lec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devicesLec 2- Hardening and whitelisting of devices
Lec 2- Hardening and whitelisting of devices
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
Introduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf fileIntroduction to Ethical Hacking pdf file
Introduction to Ethical Hacking pdf file
 
Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...Network Attacks - (Information Assurance and Security)BS in Information Techn...
Network Attacks - (Information Assurance and Security)BS in Information Techn...
 
Network security
Network securityNetwork security
Network security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer security system Unit1.pptx
Computer security system Unit1.pptxComputer security system Unit1.pptx
Computer security system Unit1.pptx
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
CNS unit -1.docx
CNS unit -1.docxCNS unit -1.docx
CNS unit -1.docx
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
The Maple County court is redesigning its network to ensure more secu.docx
 The Maple County court is redesigning its network to ensure more secu.docx The Maple County court is redesigning its network to ensure more secu.docx
The Maple County court is redesigning its network to ensure more secu.docx
 
System and web security
System and web securitySystem and web security
System and web security
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 
Network security
Network securityNetwork security
Network security
 
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptxCH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
CH2_CYBER_SECURITY_FYMSC(DS)-MSC(CS)-MSC(IMCA).pptx
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 

Recently uploaded

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
F
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
ayvbos
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
AS
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
F
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
A
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
apekaom
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
AS
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
c6eb683559b3
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
SS
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
F
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 

Recently uploaded (20)

一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303Loker Pemandu Lagu LC Semarang 085746015303
Loker Pemandu Lagu LC Semarang 085746015303
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirtsDown bad crying at the gym t shirts
Down bad crying at the gym t shirtsDown bad crying at the gym t shirts
 
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
一比一原版(毕业证书)新加坡南洋理工学院毕业证原件一模一样
 
一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理一比一原版犹他大学毕业证如何办理
一比一原版犹他大学毕业证如何办理
 
一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理一比一原版美国北卡罗莱纳大学毕业证如何办理
一比一原版美国北卡罗莱纳大学毕业证如何办理
 
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
一比一原版桑佛德大学毕业证成绩单申请学校Offer快速办理
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
一比一原版(NYU毕业证书)美国纽约大学毕业证学位证书
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理一比一原版澳大利亚迪肯大学毕业证如何办理
一比一原版澳大利亚迪肯大学毕业证如何办理
 
一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书一比一原版贝德福特大学毕业证学位证书
一比一原版贝德福特大学毕业证学位证书
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptxA LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
A LOOK INTO NETWORK TECHNOLOGIES MAINLY WAN.pptx
 

Wireless Intrusion Techniques

  • 1.
  • 2. Overview  Introduction  Common wireless intrusion techniques  Eavesdropping  IP Spoofing Attack  Data Manipulation Attack  Password-Based Attack  Man in the Middle Attack  Denial-of-Service Attack  Compromised-Key Attack  Application-Layer Attack
  • 3. Introduction Wireless intrusion techniques are the methods by which intruder gains access to the wireless network. Intruder can modify, steal, save or delete the data.
  • 4.  In general, the majority of network communications occur in an unsecured or "cleartext" format. Eavesdropping  Allows an attacker who has gained access to data paths and to "listen" the traffic.  When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping.
  • 5. • It is generally the biggest security problem that administrators face in an enterprise. Eavesdropping • Without strong encryption your data can be read by others.
  • 6. IPSpoofing  Lying about the source address lets an attacker assume a new identity.  With a valid IP address, the attacker can modify, reroute, or delete your data.  Normally, the source address is incorrect.  Basically, IP spoofing is lying about an IP address.
  • 8. Data Manipulation • Attacker can modify the data in the packet without the knowledge of the sender or receiver. • An attacker has read your data, the next logical step is to alter it. • For Example : Attacker can change the item details, amount, or billing information.
  • 9. Password Based Attack • A common denominator of most operating system and network security plans is password-based access control. • When an attacker finds a valid user account, the attacker has the same rights as the real user. • If the user has administrator-level rights, the attacker also can create accounts for subsequent access at a later time.
  • 10. Password Based Attack After gaining access to your network with a valid account, an attacker can do any of the following: •Obtain lists of valid user and computer names and network information. •Modify server and network configurations, including access controls and routing tables. •Modify, reroute, or delete your data.
  • 11. Man in the Middle A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
  • 12. Man in the Middle Attack Graphic representation of MITM attack
  • 13. Denial-of-Service Attack Unlike a password-based attack, the denial-of-service attack prevents normal use of your computer or network by valid users.
  • 14. Denial-of-Service Attack After gaining access to your network, the attacker can do any of the following: Send invalid data to applications or network services, which causes abnormal termination or behavior of the applications or services. Flood a computer or the entire network with traffic until a shutdown occurs because of the overload. Block traffic, which results in a loss of access to network resources by authorized users.
  • 15. Compromised-Key Attack A key is a secret code or number necessary to interpret secured information.
  • 16. Compromised-Key Attack  Obtaining key is a difficult task but if attacker obtain the key, that key is referred as Compromised Key.  The attacker can decrypt or modify data and can use the compromised key to compute additional keys.  Which might allow the attacker access to other secured communications.
  • 17. Application Layer Attack • An application-layer attack targets application servers by deliberately causing a in a server's operating system or applications. • The fault is results in the attacker gaining the ability to bypass normal access controls.
  • 19. Application Layer Attack The attacker takes advantage of this situation, gaining control of your application, system, or network, and can do any of the following: • Read, add, delete, or modify your data or operating system. • Introduce a virus program that uses your computers and software applications. • Introduce a sniffer program to analyze your network and gain. • Abnormally terminate your data applications or operating systems. • Disable other security controls to enable future attacks.