UNIT-2 (Part-2) - 1
UNIT-2 (Part-2) - 1
4. WPA/WPA2 attack:
A WPA attack is like a break-in attempt on a Wi-Fi network that uses the Wi-Fi Protected Access (WPA) security
protocol. WPA is supposed to make Wi-Fi more secure than older methods like WEP. But, there's a famous kind
of WPA attack called a WPA/ WPA2 handshake capture attack, also known as a 'dictionary' or 'brute-force' attack.
In this attack, when a device connects to a Wi-Fi network, it does a special handshake, like a secret handshake,
with the Wi-Fi router. In this attack, an attacker intercepts this secret handshake. Once they have it, they can try
lots of different passwords, like guessing the secret code, until they find the right one.
They might use super-fast computers or pre-made lists of possible passwords to do this. It's like trying to guess
the password to unlock a door when you know some of the clues.
5. Bluejacking:
Bluejacking is a wireless attack technique that sends unsolicited messages or business cards to Bluetooth-enabled
devices like mobile phones, laptops, or tablets. Unlike more malicious attacks, bluejacking does not aim to steal
or compromise data but to inconvenience or annoy the device owner.
Blue jacking takes advantage of the Bluetooth functionality that allows devices to discover and establish
connections with nearby Bluetooth-enabled devices.
The attacker typically crafts a short text message or business card containing a harmless or humorous message
and sends it to multiple nearby devices using the device discovery feature. When the recipient's Bluetooth is
turned on and set to discoverable mode, they receive the unsolicited message as a notification or text popup.
6. Replay attacks:
A replay attack is a network intrusion method in which an attacker tricks where someone intercepts and copies
messages sent between two entities, like computers, to later use them in a deceitful way.
They take advantage of the fact that some systems don't have ways to recognize or stop these repeated messages.
The attacker captures legitimate network communications between two entities, which can include authentication
requests, encrypted messages, or session tokens.
Later, they replay these captured messages to the target system or network, pretending it's the real deal, and
tricking it into allowing unauthorized access.
It's a bit like playing a recording of someone saying the secret password to open a door.
7. Bluesnarfing:
Bluesnarfing is a type of cyberattack that targets Bluetooth-enabled devices, allowing unauthorized access to
sensitive information on the targeted device. Unlike bluejacking, which involves sending unsolicited messages or
files, bluesnarfing is more malicious as it aims to steal data.
In bluesnarfing, attackers exploit vulnerabilities in the Bluetooth protocol to gain unauthorized access to a device,
such as a mobile phone or a laptop. Once access is gained, the attacker can extract various types of sensitive
information, including contacts, messages, photos, or other personal data stored on the device.
Bluesnarfing takes advantage of security weaknesses in Bluetooth implementations, and successful attacks can
compromise the privacy and security of the affected individual.
To protect against bluesnarfing, it's essential to keep Bluetooth devices updated with the latest security patches,
use strong and unique PIN codes or passwords, and be cautious about pairing with unknown or untrusted devices.
8. RF jamming:
RF, or Radio Frequency jamming, is a deliberate and malicious interference with wireless communication signals
using powerful Radio Frequency (RF) transmissions.
The purpose of RF jamming is to disrupt or disable wireless communication within a specific frequency range,
rendering devices unable to send or receive signals effectively.
RF jamming involves transmitting high-power RF signals on the same frequency band as the targeted wireless
communication. The jamming signals overpower or interfere with the original signals, causing interference or
blocking them entirely. This interference disrupts the normal operation of wireless devices such as Wi- Fi networks,
cellular networks, GPS systems, radio systems, or other wireless communication technologies.