Cybersecurity Methods & Tools
Cybersecurity Methods & Tools
2
Learning Objectives
01 Interpret and Document - Password Cracking attacks.
02
Compare Key loggers and Spywares, Virus and Worms, Trojan and
Backdoor, Steganography.
03 Understand and Identify DoS and DDoS Attacks.
02 04 0
6
01 0 0
3 5
6
Password
1 Cracking
What is Password Cracking?
• Password
cracking techniques are
used to recover
passwords from the data
that are stored in computer
systems or from the ones
that are being transmitted.
9
Password Cracking Techniques
Guessing Dictionary Attacks Brute Force Attack
• Guessing passwords is the • As the name suggests, there are multiple words • Brute force attack is a bit more
most basic technique. already defined in the system. sophisticated then dictionary attack as it
includes non-dictionary term such as
• Most passwords are easy to • one by one they are bombarded to the system alpha-numeric combinations.
predict based upon a until the match is found. For example abcd,
person’s important details aaaa, etc. • So, passwords such as a1b2c3, abc123
such as birthdate, family could be easily recoverable by this attack.
member details, etc. • If you mash words together to make a phrase,
such as “smart administrator officer” to avoid • This method slows down when larger
dictionary attacks then this attack will take passwords are used.
more time but is able to crack the passwords by
using combinations of words. • It needs additional power to reduce hacking
time.
10
Password Cracking Techniques
Rainbow Table Attack Phishing
• When an attacker tries to use a rainbow hash table to hack passwords present in • There's a much easier way to crack password:
the database then it is called a Rainbow table attack. ask the user himself for his password.
• A rainbow table is a 1-way hash function used for storing important data such as • A phishing email leads the unsuspecting
passwords and their corresponding hash values in the database. reader to a fake login page, requesting the user
to provide their credentials and passwords.
• Hence, whenever the user enters a password, the password is encrypted every time
with the same key and then matched with the stored password. • That page then skims the password and the
hacker can go use it for any purpose.
• Attacker create the table with the most common passwords and then they search
whether these passwords are present in the database. As the match is found the • Why to write such big codes and programs to
process is terminated and the password is cracked. crack passwords when the user itself is
providing them to you?
• However, rainbow tables are huge, they require a huge amount of space to run. If
the hash is salted i.e. a random character is added before hashing the password
then rainbow tables does not work.
11
Password Cracking Techniques
Social Engineering Offline Cracking Shoulder Surfing
• Social engineering refers to the • In offline cracking, the attacker • It’s the oldest and simplest method that
malicious activities that take place via tries to extract the password hash always works. It’s also called as visual
human interactions. file stored by the victim in hacking.
computer systems and attempts to
• At first attacker gathers information crack them without alerting the • A sharp-eyed attacker sneaks into your PC's
about the victim. victim. keyboard or ATM keypad while providing
pin or password to some software.
• Then it tries to acquire the victim’s trust • These kinds of attacks i.e. offline
and tries to make user agree to some attacks are the most widespread • They can record/recognize the movement of
security practices that grant access to attacks for password cracking. your fingers and later take advantage of it.
critical resources.
• They find security holes in the • This attack can take place anywhere for
• This technique relies on human error victim’s infrastructure to make example at ATMs or restaurants while
rather than software vulnerabilities. this kind of attack work. paying a bill or when you perform some
This type of attack can take many bank transaction in public places.
different forms and it works very often.
12
Password Cracking Techniques
Spidering Malware
• Spidering technique relies on the victim information • When an attacker creates malicious software and
intimately. installs it in the victim’s system without the victim’s
knowledge to gain personal info or to damage system
• Many companies use passwords that are related to their is called malware attack.
business.
• It can record everything during login or signup and
• Hence, attackers study business corporate literature, copy documents to his computer.
mission statement, sales material and create a word list
that can be used as a part of a brute force attack. • Also, the passwords stored in browsing history or the
bank and debit/credit card details can be easily
• There are some automated tools available for improving accessed.
the efficiency to crack passwords.
13
Preventive Measures
Avoid using most Store encrypted Add salt to the password.
common and predictable passwords into the Salting involves adding
Avoid short and weak
passwords such as database and try to hash some word to the
passwords.
1234, a1b2c3 or 112233, it more than once with provided password
etc. same or different keys. before creating the hash.
14
7
character
password
- 0.29
seconds 8
character
password
Amount of - 5 hours
time
required to
11 crack
password 9
character
character
password
password
-1 10 - 5 days
decade character
password
-4
months
15
John the Ripper THC Hydra
Wfuzz OphCrack
RainbowCrack L0phtCrack
PASSWORD
Brutus CRACKING AirCrack-NG
TOOLS
16
Points to remember
17
Chapter 3
Topic 2
18
2 Enumeration
What is Enumeration?
Enumeration is the process of extracting User names, Host names,
information from the system. Group names Machine names
To do this, attacker first creates active
connection and performs queries.
Network shares Routing tables
These queries result in giving more information and services and IP tables
about target device.
And result is then used in identifying Service settings
vulnerabilities and weak points in the system. Application and
and Audit
banners
configurations
Enumeration is mainly used to gather following
information -
SNMP and
DNS Details
20
Types of Enumeration -
SNMP NTP DNS UNIX or Linux
enumeration enumeration enumeration enumeration
02 04 0 0
6 8
01 0 0 07
3 5
enumeration
NTP Enumeration:
NTP server supports querying. So attacker can enumerate list of hosts connected to
NTP server and find client IP addresses, the device names and operating systems they
are using.
SMTP
SMTP Enumeration:
enumeration SMTP servers use three built-in commands and these are used by attackers for
enumeration. Attacker use this commands to validate users from the SMTP servers.
Below given are the commands used -
VRFY – validate users on the SMTP servers
EXPN – Delivery addresses of aliases and mailing lists
RCPT TO – Defines the recipients of the message
Name of the
Sr. no. Description
tool
Windows 01 PsExec One can run processes on remote system
enumeration 02 PsFile Gives information about the files opened on remote system
03 PsKill Processes running on remote device can be killed using this tool
06 PsLoggedOn Local as well as remote logged users can be listed using this tool
30
Chapter 3
Topic 3
31
3 Keyloggers
Keyloggers
Have you heard of any tool that records
the keystrokes you make on the keypad? Keyloggers
33
Software-based Kidlogger
keyloggers
Spyrix
Best Free
Software-based keyloggers try to monitor Free
Keylogger
keystrokes by recording it and then sending the Keylogger
recording to the hacker by uploading the recordings Software
Keyloggers
on some internet source.
They can also track all the information that we enter
into websites over the internet using screen
recording.
Elite Windows
These keyloggers are now being used for keeping Keylogger Keylogger
an eye on employees or by parents to know about
their children’s activity.
34
Hardware-based
keyloggers
Hardware based keyloggers don't need
installation, instead they are needed to be fit
inside the physical system of a PC. They come in
a chip format.
Monitor based Keyloggers monitor the keys
pressed by the user and record them without the
user's knowledge.
Acoustic Keyloggers records the sound of the
keystrokes which is unique thereby making it
predictable.
Keyloggers can be attached to any hardware
device.
35
How to detect a keylogger?
To detect whether any keylogger is running in
your PC, you just have to go through your task
manager and check all processes running on
your device.
36
Anti-Keylogger
It is software that helps in
detecting the keylogger if present.
37
3 Spywares
What is spyware?
Spyware is a type of malware that tries to keep Some strains of spyware are also capable of
itself hidden while it secretly records information activating cameras and microphones to watch
and tracks your online activities on your and listen to you undetected.
computers or mobile devices.
By definition, spyware is designed to be invisible,
It can monitor and copy everything you enter, which is most harmful attributes — the longer it
upload, download, and store. goes undetected, the more damage it can cause.
Types of
Spyware
Tracking System
Adware Trojans Keyloggers Stalkware
cookies monitors
39
Is spyware a virus?
What does it actually do?
40
Adware: It catches your online activities and displays ads. When compared to some other forms of spyware, adware can
Types of spyware have an impact on the performance of a device, as well as just being annoying.
Tracking cookies: They're similar to adware, although they tend to be less intrusive.
Trojans: After landing on a device, they look for sensitive information, such as bank account information, and send it to
a seedy third-party who will use it to steal money, compromise accounts or make fraudulent purchases. They can also
be used to gain control of a computer through the installation of a backdoor or a remote access Trojan (RAT).
Keyloggers: They allow a miscreant to capture every keystroke from your keyboard, including the keystrokes you use
when you log into your online accounts.
Stalkerware: It's typically installed on a mobile phone so the owner of the phone can be tracked by a third party. For
example, during the trial of Joaquín “El Chapo” Guzmán, it was revealed the drug kingpin installed spyware on the
phones of his wife, associates and female friends so he could read their text messages, listen to their conversations and
follow their movements.
Stealware: It's crafted to take advantage of online shopping sites awarding credits to websites that send traffic to their
product pages. When a user goes to one of those sites, stealware intercepts the request and takes credit for sending the
user there.
System monitors: They record everything that's happening on a device—from keystrokes, emails and chat room
dialogs to websites visited, programs launched, and phone calls made—and send it to a snoop or cyber criminal. They
can also monitor a system's processes and identify any vulnerabilities on it.
41
How to tell if you have spyware?
To see whether it has infected your computer or mobile
system, look for these warning signs:
42
3 Virus
What is a Virus?
Virus is a program that damages documents or
changes your file contents.
• Macro types of viruses infect word, excel, PowerPoint, access and other data files.
Macro Virus • Once the file is infected by macro virus it becomes difficult to repair these files.
• Multipartite virus is a mixture of Boot and File viruses which infects program files.
Multipartite virus • When the infected program is executed, they infect the boot record.
• Polymorphic viruses are encrypted viruses which are very difficult to detect.
Polymorphic virus • This virus appears differently every time in new infection due to ability of encryption.
• The stealth viruses use various kinds of techniques to escape from its detection.
Stealth virus • They can change the size of the infected file in the directory.
• They can direct the disk head to another sector so that they cannot be found by user. 45
3 Worms
What are worms?
Worm is the malicious program that copies
itself repeatedly.
Internet
worms
Email
IRC worms
worms
Types
of
worms
Instant
File sharing
messaging
worms
worms
BASIS FOR COMPARISON VIRUS WORMS
Virus is type of program that attaches itself to exe files, i.e.
Worm is malicious, self replicating program that spreads
Definition executable files and transfers from one computer to
through computer network.
another.
Need of host Host is needed for spreading virus. It doesn't need a host, since it can replicate itself.
It can alter or erase file and program. It can also corrupt It consumes system resources and hence it slows the
Effects
files. system and can also completely halt the system.
49
Trojans and
3 Backdoors
Trojans
Trojans also known as Trojan horses are malwares
used for compromising target device.
51
Trojans
Also used by attackers to gain information about your
device. This can cause data theft and other serious
issues.
Apart from this they are also used as key loggers and
can make notes of typed data. They are also capable
of capturing screenshots.
52
Remote Access Trojan Gain Remote control of victim
Types of
Trojans Destructive Trojan Corrupt or delete files
Command Shell Trojan Uses commands to open ports to gain remote access
Email Trojans Access to victim’s computer is taken using sending email and having
them click a link
VNC Trojan VNC servers are used for controlling computer and avoiding being
caught by anti-virus
Botnet Trojans These are used by attackers to use system as Bot for conducting
other attacks 53
Trojans
Wrappers
• These are also known as Guleware and are used for binding Trojans with applications that
look genuine.
• They wrap Trojans, so that one cannot find them.
• Also due to these genuine looking applications, users often download and install them for
their use.
• So when these are installed, Trojan also gets installed without the knowledge of the user.
Example – Kriptomatik.
Evading Antivirus
• Evading anti-virus is nothing but the technique to avoid anti-virus program.
• Do not use existing Trojans as they can be easily detected. Instead they write Trojan
programs by themselves.
• To avoid being caught, they rename file extensions. Example – .exe to .xls or .ppt or .mp4,
etc.
• Divide Trojan file into multiple parts and then send different parts in different ways to the
target device and them combine it to make Trojan file.
• To avoid matching signature and to avoid being caught by IDS, checksum value is changed.
54
Backdoor
Backdoor is Trojan program used by
attackers to enter again into the target
system.
55
Scan Protect your
Do not Use
Make sure external system from
download anti-virus.
you update CDs, pen unauthentic
How to prevent unknown
and
Anti-virus
informs
Use firewall
to restrict
your drives, ated access
applications Floppies and
Trojan? unverified
applications
user when it
finds
untrusted
sites.
whenever first and installation
new update use only if of
from something
arrives. they are applications
internet. malicious.
safe. .
56
3 Steganography
Steganography
Steganography is influenced by
Greek influences. It means
“Covered writing”.
This technique is used for hiding
the secret message by fake
message to prevent the secret
information from getting emerged.
Steganography
58
Types of Steganography
Image Steganography
60
Types of Steganography
Video Steganography
64
Chapter 3
Topic 4
65
4DoS and
DDoS attacks
DoS attacks
DoS stands for Denial of Services.
67
Techniques for conducting DoS attack
Buffer Overflow Attacks
• In this technique, machine consumes available hard disk
space, memory or CPU time. Teardrop Attack
• This is generally known as memory buffer overflow attack.
• In this attack, IP data packet fragments are sent to a
• Due to consumption of memory, it results in system crashes or network.
sluggish behaviour or other deleterious behaviours in servers
• Fields in the fragments are designed in such a way
which further results in denial of service.
that they confuse the system.
• So this process of compiling fragments to original
Ping of Death or ICMP Flood packets, results in exhaustion which further results in
system crash.
• Attacker takes the misconfigured or unconfigured network
device or devices to send spoofed packets.
• This spoofed packets pings every node within that network. Smurf Attack
• Such attacks are known as the ICMP flood attacks or ping of • In this type, attacker uses broadcast address of
death(POD) attack. vulnerable network.
• This is used for sending spoofed packets to target IP
SYN Flood address.
• Which results in flooding and thereby results in denial
• Attacker keeps sending requests but doesn’t complete of the service.
handshake.
• As a result, network is flooded with requests and this means
now network cannot take more requests.
• So it prevents others from connecting to network. 68
DDoS Attacks
DDoS attack stands for Distributed Denial of
Services attack.
69
70
Types of DDoS Attacks
Types of
DDoS
Attacks
Attacks Layer 7
UDP floods ICMP floods Ping floods Ping of Death SYN Flood targeting the HTTP Flood
DNS server Attack
71
DoS vs DDoS: What’s the Difference?
In DoS attacks, single system is used conduct Single system cannot send the amount of traffic
attack while in DDoS attack, multiple systems are multiple systems can send together.
used to conduct attack. This is the main difference
Due to this, DDoS is more dangerous than DoS attack.
between DoS and DDoS.
DoS attack is conducted through script or DoS tools
Due to use of multiple systems from multiple
while DDoS attack is conducted by controlling bots
locations, DDoS attacks are difficult to detect as
and executing attack.
origin of the attack cannot be detected easily.
72
How to detect DoS
and DDoS attacks?
73
Commonly used DoS/DDoS attack tools
74
Preventive Measures
Make sure you develop
One cannot prevent DDoS DDoS prevention plan by Make sure you use updated
Use firewall, VPN, load
attack completely but we can properly researching and applications or products as
balancing, anti-spam, content
definitely try to reduce its understanding your network outdated applications often
filtering and other techniques
effect by following and system. This is critical have security issues that are
to secure network.
techniques given below. step and needs to be patched in updated versions.
followed properly.
Difference There is no
Purpose for
between DoS and particular way to
DoS is Denial of conducting this
DDoS is DoS uses prevent this attack
Services and attacks are - server
single machine but some steps can
DDoS is becomes
while DDoS uses be taken to avoid
Distributed Denial unavailable and
multiple machines this attack and
of Services. service is denied
for conducting minimizing its
to the user.
attack. effect.
76
Chapter 3
Topic 5
77
5
SQL Injection
SQL Injection
SQL Injection attack is also known as SQLi attack. They can also use this technique to add or retrieve
or alter data in the database.
In this attack, attacker uses SQL vulnerabilities to execute
malicious SQL statements. This is one of the oldest and favourite attack of
attackers due to the fact that it is still working and
Web applications and websites use database to store data
is considered as one of the most damaging attack.
and this databases use SQL for performing operations on
data. The OWASP (Open Web Application Security
Project) Organization has listed top ten web
This means, SQL statements can control database server.
application security risks, and guess what, SQL
Attackers use this technique to bypass security measures set
injection tops the list!
by applications.
79
How an SQL Injection Attack Performed?
80
Why SQL Injection Attack is Performed?
Attackers can gain credentials of other users. Attackers can
then impersonate as these users and there can be admin
having all database privileges.
SQL Injection
Boolean-bas Time-based
Error-based Union-based
ed Blind SQL Blind SQL
SQL injection SQL injection
injection injection
82
83
Tools used for SQL injection
BSQL
SQLmap
Hacker
Safe3 SQL
SQLninja
Injector
SQLSus Mole
84
Preventive Measures
Use Prepared Statements: Using prepared Disable unwanted functionalities: It is Hide information of error messages:
statements with parameterized queries is important to disable functionalities you do Attackers can learn almost everything from
easy to understand and simple to write. User not need, as this functionalities can be used error messages. So try to show only required
entered values are taken in variables which by attackers to gain access to important data information and use general error messages
is passed as a parameter in query. in your database. to avoid disclosure of error messages.
Avoid using root privileged account: If Update system: Whenever you encounter
you use attack having root privileges on that your web applications or websites have
your web apps or pages, then attacker might SQL vulnerability, it is important to solve it.
gain access to whole database. So it is Once solved, make sure you apply patch and
always better to use account having few update system so that you can avoid attacks
privileges on your web apps or web pages. in future.
85
Buffer
5
Overflow
Buffer Overflow
Buffers are temporary storage memory regions. This overwriting can cause lot of issues such as
They are used for storing data temporarily. programs behaving unpredictably, memory access
errors, crashes and can even generate results
When data is more than the buffer storage capacity,
incorrectly.
buffer overflow occurs.
Attackers use this to create triggering response that
In this situation, since buffer is full, adjacent
damages files or changes execution of program.
memory locations are used.
87
What are the different types of buffer overflow
attacks?
Stack Overflow Attack Heap Overflow Attack Integer Overflow Unicode Overflow Attack
Attack
• This is one of the old methods • Heap Overflow occurs when • Unicode is encoding method just
used by attackers. buffer was allocated using • When arithmetic operations like ASCII. Difference between
malloc( ) routine, so when give too large Integer results, ASCII and Unicode is that ASCII
• In this attack, buffer gets more overflow occurs, heap buffer cannot store whole only covers English characters
data by the program then the memory is used to store result due to predefined while Unicode covers almost
space allocated for it. access attack. Integer capacity. every written language.
• This extra data is then written • This is used by attackers for • Since this result is Integer in • Due to this difference Unicode
on program’s stack, resulting crashing programs. type, and it results in buffer characters are larger than largest
in corruption of data or overflow, so it is known as ASCII character. So whenever
crashing of program or Integer Overflow Attack. user inputs Unicode characters
program operating incorrectly. instead of ASCII characters,
Unicode Overflow attack occurs.
88
How to detect this attack?
89
How to Prevent Buffer Overflows?
Buffer Developers can prevent this attacks by For example, data of maximum 4 bytes is expected from
writing code that is more secure and by user then only 4 bytes of data should be written in buffer
allowing limited number of bits or bytes of and this can be done by limiting input data to that size.
input data and by using languages that offer
Now a days, operating systems are also providing
built-in protection.
runtime protection. They are given below:
Structured exception
Address space Data execution
handler overwrite
randomization (ASLR) prevention
protection (SEHOP)
• Address space randomization • Operating System reserves • Structured Exception Handler
is the technique used by OS to some memory locations and (SEH) is built in function that
move randomly around flag them as non-executable. manages hardware and software
address space locations of data • This prevents attack from exceptions.
regions. running code in this • So SEHOP stops malicious code
non-executable area, leading from attacking SEH.
to failure of attack.
90
Points to remember
91
Chapter 3
Topic 6
92
6 Phishing
What is Phishing?
In simple terms, Phishing is a
cybercrime where attacker pretends
being legal to get information from
the user.
94
Web based
delivery
Spear
Ransomware
phishing
Link
Malware
manipulation
Phishing
Smishing Technique Key loggers
Vishing Trojan
Content
Malvertising
injection
Session
hijacking
95
96
Common Phishing Scams – Can you guess?
97
Email Phishing Scams
98
99
Website Phishing Scams
100
Preventive Measures
To prevent falling for this type of Now a days, browsers have
scams you first need to have Do not click on links on random anti-phishing toolbars as an
knowledge that this scams exist emails, messages and untrusted Look at salutations, your name in option. Install those in your
and how they work. So it is websites. Try to make a habit of the emails to make sure that it is browser. This toolbars have list
important to keep yourself and hovering on links to see on which from trusted source. of known phishing sites, so if
people in your organisation page it is going to take you. you come across one then toolbar
updated about such attacks. will give you alert.
103
Types of Identity Theft
• Financial identity theft refers to the identity theft used for financial purpose.
Financial Identity Theft • This is also known as bank fraud and is discovered when victim notice change in credit history or
he/she finds new accounts or he/she is contacted by banks.
• In this type, attackers use personal information collected by them to become that person in order to
Identity Cloning and conceal themselves from authorities.
Concealment • They use this information to avoid being arrested and to depart from one place to another.
• This cloning identity can be detected only if authorities find them.
• Criminal identity theft refers to identity theft used by criminals to identify him/her as another
individual in front of police.
Criminal Identity Theft
• They can use this for obtaining state-issued id or fake id.
• Victim gets arrested in some cases like traffic violation, etc.
• As name suggests, synthetic identity theft is identity theft used by attacker to make identities that are
fabricated partially or entirely.
Synthetic Identity Theft • That is, fake name and birthdate is used with actual address and driving licence number.
• This synthetic ids are then used by attackers for granting credits from creditors.
• Victim gets affected only if their names are confused with synthetic identities.
• When id thief uses information such as person’s name and/or existing insurance for getting medical
services or goods so that their name does not appear on records.
Medical Identity Theft • This is done without victim’s knowledge and results in creating fake medical records or errors in
existing records.
• Since this is used for medical purpose, it is known as Medical Identity Theft.
Techniques for identity theft
Skimming Dumpster Diving Old-fashioned stealing
•Special storage device is used to connect to •Attacker dives i.e. goes through trash to •Attackers use old techniques to conduct
ATM machines for stealing credit/debit card obtain personal information. attacks.
numbers. •They check trash for bills, credit cards, bank •They target purses, wallets, statements of
•This device is used to read card details using statements and other information. banks, personal records, medical records,
magnetic strip attached in your card. •So make sure you shred documents properly checks, tax information, etc. for gaining
before throwing them in trash. sensitive information.
106
Points to remember
107
Chapter 3
Topic 7
108
Attacks on
7 Wireless
Networks
What are Wireless Network Rogue Access Point
Jamming/Interference
Packet Sniffing
Wireless Network attacks are attacks done on
Wireless networks such as Wi-Fi. WEP Attacks
Initialization Vector
110
Rogue Access Points
A rouge access point is an access point added to
the network without the knowledge of owner/
administrator.
111
Jamming/Interference
Wireless interference is the technique used to
disrupt network or jam the network.
112
Evil Twin
Attacker first purchases a wireless access point,
connects it to the network and configures it to
look like exactly existing network access point.
113
Packet Sniffing
Packet sniffing refers to capturing this packets
or sniffing this packets from the network.
114
WEP Attacks
WEP attacks occur due to the weakness in
WEP encryption methods and systems.
115
WPS attacks
WPS attacks occur when WPS protocols
are not implemented or they are poorly
implemented.
116
Man In The Middle Attacks (MITM)
Man in the middle attacks compromise
integrity of messages on the network.
117
Session Hijacking
As the name suggests, in session hijacking,
attacker hijacks the session i.e. attacker
takes the control of the whole session.
118
War driving
This attack is used by attackers to find access
points wherever they can be.
119
Bluejacking
Bluejacking refers to Bluetooth jacking.
120
Bluesnarfing
Bluesnarfing refers to Bluetooth snarfing.
121
Initialization Vector (IV) attack
Initialization vector attack also known as IV
attack.
Airjack NetStumbler
•Airjack is Wi-Fi 802.11 packet injection tool •NetStumbler verifies network configurations,
and wireless cracking tool. finds open access points, unauthorised access
•This tool can send forged packets in the points and is used for war driving, finds poor
network and flood it to perform DoS attack. networks and can do much more.
•It is also used for MITM attack and hence it • Due to all this features, this tool is very
is powerful and popular among users. useful in learning purpose.
123
Preventive Measures
Keep your router in the Use tools to adjust signal such
Apply WPA2 security. And
center. This will not just If central placement of router that it is minimum beyond
turn off WPS. This will make
provide network equally, but is not possible, then try to use walls. Measure how far the
your network difficult for
this will also make sure that directional antennae. reach of your network is using
attackers to break.
signal degrade beyond walls. these tools.
124
Points to remember
Securing wireless
Jamming/Interference,
network is really
packet sniffing, man in
Wireless network attacks necessary and can be
the middle, evil twin,
are attacks conducted on done by using firewalls,
session hijacking are
wireless networks using setting VPN, avoiding
some of the very
vulnerabilities. using open networks and
common and popular
by taking some other
wireless network attacks.
precautions.
125