Caution! Wireless Networking: Preventing a Data Disaster
In this chapter I introduced some of the methods that a cracker might use when attacking your WLAN. These included:
-
How a cracker might hijack a user’s Wi-Fi session
-
How crackers use spoofing to gain access to wireless networks
-
What rogue access points are, and how crackers use them to steal user logon information
-
Denial of service (DoS) attacks, including how crackers use them to disrupt wireless networks
These are just some of the attacks that are possible against wireless networks. In the next chapter, I will present some others, including attacks that target WLAN clients like your notebook or even your PDA.
Категории