Skip to main content

Wireless Attacks and Penetration Testing (part 2 of 3)

posted onJune 15, 2004
by hitbsecnews

There are several techniques to performing penetration testing on your wireless network, the objective of all of them being to improve the security and integrity of the network itself. What wireless lacks in the security of the physical layer and medium must be compensated for in protections on other layers of the stack. As you'll recall from Part I of this article, there are many different attacks that a nefarious individual can carry out on your wireless network.
In this installment, I'd like to focus more on a cracker attempting to penetrate your network and hack one of the servers held therein. The three phases of this hypothetical, but entirely realistic attack, consist of:

1.) Gaining access to the wireless network, even though it is protected by WEP2. finding available servers on the network

2.) Determining the services on those servers available for connection (and exploit)

3.) Taking advantage of a well-known vulnerability to gain unauthorized access to a machine

Let's begin.

Source

Tags

Wireless

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088