wanna anonymously connect to other devices ....

in #security7 years ago

Wireless-Attacks.png

Since corporations are becoming more disciplined with strengthening their wireless networks, trends show that wireless users have become the easiest target. Forcing secure Wi-Fi usage when it concerns human behavior is hard.

The normal wireless user is really not familiar with the threats imposed by connecting to an open Wi-Fi network at a local coffee shop or airport. Sometimes, users may inadvertently connect to a wireless network that they think is the true access point but that has, in reality, been set up as a honeypot or open network specifically to pull unsuspecting fools.

For example, a normal user may have a network at home named [“ADSL”][1]. As a result, their device may automatically connect to any other network known as “ADSL.” This built-in function can lead to an unintended connection to a malicious wireless network, more commonly referred to as wireless phishing.

Once an attacker obtains access to the user’s device, not only could the attacker steal data such as sensitive files, but the attacker could also collect wireless network credentials for the user’s corporate network. This attack may be far simpler to do than attacking the organization network directly. If an attacker can gain the credentials from a wireless user, he or she can then use those credentials to access the organization enterprise wireless network, bypassing any encryption or safety mechanisms applied to stop more sophisticated attacks.

[1] https://en.wikipedia.org/wiki/Asymmetric_digital_subscriber_line

Sort:  

Not indicating that the content you copy/paste is not your original work could be seen as plagiarism.

Some tips to share content and add value:

  • Using a few sentences from your source in “quotes.” Use HTML tags or Markdown.
  • Linking to your source
  • Include your own original thoughts and ideas on what you have shared.

Repeated plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the cheetah bot.

Creative Commons: If you are posting content under a Creative Commons license, please attribute and link according to the specific license. If you are posting content under CC0 or Public Domain please consider noting that at the end of your post.

If you are actually the original author, please do reply to let us know!

Thank You!

Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://latesthackingnews.com/2017/09/19/wireless-phishing/

Congratulations @sathishs! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

You made your First Comment
Award for the number of upvotes received

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!

Congratulations @sathishs! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

Award for the number of upvotes

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!