Linksys WET11 manual Passive Attacks, Jamming Attacks

Page 31

Wireless-B Ethernet Bridge

But even WEP has its problems. WEP’s encryption algorithm is referred to as “simple”, which also means “weak”, because the technology that scrambles the wireless signal isn’t too hard to crack for a persistent hacker.

There are five common ways that hackers can break into your network and steal your bandwidth as well as your data. The five attacks are popularly known as:

1.Passive Attacks

2.Jamming Attacks

3.Active Attacks

4.Dictionary-building or Table Attacks

5.Man-in-the-Middle Attacks

Passive Attacks

There's no way to detect a passive attack because the hacker is not breaking into your network. He is simply listening (eavesdropping, if you will) to the information your network broadcasts. There are applications easily available on the Internet that can allow a person to listen into your wireless network and the information it broadcasts. Information such as MAC addresses, IP addresses, usernames, passwords, instant message conversations, e-mails, account information, and any data transmitted wirelessly, can easily be seen by someone outside of your network because it is often broadcast in clear text. Simply put, any information transmitted on a wireless network leaves both the network and individual users vulnerable to attack. All a hacker needs is a “packet sniffer”, software available on the Internet, along with other freeware or shareware hacking utilities available on the Internet, to acquire your WEP keys and other network information to defeat security.

Jamming Attacks

Jamming Attacks, when a powerful signal is sent directly into your wireless network, can effectively shut down your wireless network. This type of attack is not always intentional and can often come about simply due to the technology. This is especially possible in the 2.4 GHz frequency, where phones, baby monitors, and microwave ovens can create a great deal of interference and jam transmissions on your wireless network. One way to resolve this is by moving your wireless devices into the 5 GHz frequency, which is dedicated solely to information transmissions.

Appendix B: Wireless Security

26

What Are the Risks?

Image 31
Contents 802 GHz .11b Wireless- B Copyright and Trademarks How to Use this GuideTable of Contents Wireless-B Ethernet Bridge Ad-Hoc Mode Infrastructure ModeIntroduction IntroductionWhat’s in this Guide? Wireless-B Ethernet Bridge Network Topology Ad-Hoc versus Infrastructure ModeAd-Hoc Mode LAN Getting to Know the Wireless-B Ethernet BridgePWR Connect the Ethernet Network Cable Connecting the Wireless-B Ethernet Bridge for SetupSetup Wizard Setting Up the Wireless-B Ethernet BridgeOverview List of Bridges Wireless Settings WEP Key Connecting the Wireless-B Ethernet Bridge for Network Use Starting the Web-based Utility Using the Wireless-B Ethernet Bridge Web-based UtilityWireless SetupSite Survey Password Tab MAC Address AdvancedLAN Statistics LAN SettingsWireless Settings StatusHelp Tab HelpCommon Problems and Solutions Appendix a TroubleshootingWeb-based Utility doesn’t detect the Bridge Frequently Asked QuestionsWhat is ad-hoc mode? What is Spread Spectrum? Brief Overview Appendix B Wireless SecurityWhat Are the Risks? Jamming Attacks Passive AttacksMan-in-the-Middle Attacks Maximizing Wireless SecurityActive Attacks Dictionary-Building or Table AttacksWireless-B Ethernet Bridge Ssid Wireless-B Ethernet Bridge Figure B-2 WEP Encryption WEP EncryptionAppendix C Upgrading Firmware Shared Resources Appendix D Windows HelpNetwork Neighborhood/My Network Places Appendix E Glossary Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Wireless-B Ethernet Bridge Buttons Appendix F SpecificationsModel Standards Ieee 802.11b, Ieee PortsOperating Humidity Warranty Year LimitedStorage Humidity Limited Warranty Appendix G Warranty InformationFCC Statement Appendix H Regulatory InformationIndustry Canada Canada Wireless-B Ethernet Bridge Appendix I Contact Information