Kamis, 04 September 2014

BaseStation Clone

Wireless technology is good for connecting between distant areas. However, this technologically has weaknesses, especially in terms of security. Generally, the disorder is often encountered in WiFi technology include:
1) Insertion Attacks, which can attack the network by inserting something without permission.
2) interception and monitoring of wireless traffic, such as messaging / data by broadcasting (broadcasting) into the network. Disruption of this model are generally known by various terms such as, Wireless Sniffer, Hijacking The Session, Broadcast Monitoring, arpspoof Monitoring and hijacking, and BaseStation Clone (Evil Twin) .f
3) Misconfiguration, which can be caused by a misunderstanding of the user, or the unavailability of network blueprints. It could also be due to a physical disability hardware.
4) Client to Client Attacks, by utilizing the filesharing service or use TCP / IP.
5) Denial of Service (DoS) in the form of sending the file as a virus that can record user activities to obtain data (Hybrid Threats).
6) interference resulting network can not be used. This is because the WiFi uses the 2.4 GHz frequency that does not require a license from the government and WiFi access points can be bought freely. Naturally, if the interference is possible because of the nature of the network is free.

Tidak ada komentar:

Posting Komentar

.::BY JUMBHO MY AT HOME IN THE JEPARA CITY OF BEAUTIFUL::.