Results 1 to 7 of 7

Thread: wireless MITM

  1. #1
    Join Date
    Apr 2010
    Posts
    72

    wireless MITM

    Hi everyone,
    I have given an assignment about the MITM that works with the wireless. Since, you guys know about more things, I expect that there would be some members that can help me on this topic. I also want to know about the protection against attacks man-in-the-middle. I am hoping some help from your side as soon as possible.!!

  2. #2
    Join Date
    May 2008
    Posts
    3,516

    Re: wireless MITM

    Put a point on the route of entry of rogue available to be placed Fi, wireless specific variation is a man in the wireless stations is specific variation of a man in the middle attack. If the attacker knows the SSID and the rogue AP has enough force, Fi, then the users have no way of knowing. Laptop with two wireless adapters, in which card is used by the rogue AP and the other is used for sending multiple requests through a wireless bridge to a legitimate AP.

  3. #3
    Join Date
    Oct 2008
    Posts
    161

    Re: wireless MITM

    As its name implies, "Man in the Middle" means that the hacker manages to fall between the Access Point and WLAN client device. In this way customer communications that wifi wireless network will be controlled by the hacker, who can make three different types of actions based on interest.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: wireless MITM

    By an attack Man-in-the-Middle, a hacker can achieve the following :
    • Modify or alter information being transmitted through it and thus confuse or mislead the recipient.
    • Transmit the information without any change. Thus learning of content achieved
    • Lock the information received and ensure that it never comes to the attention of the recipient.

  5. #5
    Join Date
    Oct 2008
    Posts
    137

    Re: wireless MITM

    To perform this attack, the hacker must first locate a WiFi wireless network (or inlámbrica wifi network) to attack. It should also gather information about the SSID and other parameters of the access point wireless network and the wireless client has chosen for his attack. For the attack will need a Wireless Access Point and a wireless client computer. There is now software that can emulate a PC in an Access Point, which may be enough for a computer that meets the two functions: access point and wireless client, at a time. The Access Point's hacker will "attract" the client (or clients) wifi wireless network that's going to attack, to connect him to the Access Point and not legitimate. On the other hand, your PC legitimate client will send this information to the Access Point "true".

  6. #6
    Join Date
    Feb 2008
    Posts
    130

    Re: wireless MITM

    The attack mentioned is the latest version of MITM, in which the user suffers a hoax and is taken to the wrong website. The most common techniques to lure visitors include phishing emails, fake wireless site, and more recently, the attack on non-secure DNS servers. Fraudulent use a server to intercept communications between the user's browser and a legitimate Web site, and then works as a proxy, capturing confidential information via HTTP (not HTTPS) between the browser and the server fraudulent.

  7. #7
    Join Date
    Oct 2008
    Posts
    107

    Re: wireless MITM

    The defense against rogue APs is monitoring through frequent scrutiny of the site using tools such as Netstumbler and reviews by the site using tools such as NetStumbler and AiroPeek, and physical security. Laptop with two wireless adapters, in which card is used by the rogue AP and the other is used for sending multiple requests through a wireless bridge to a legitimate AP.With a strong enough antenna, the rogue AP does not have to be located within walking distance to the legitimate AP.

Similar Threads

  1. Replies: 11
    Last Post: 27-12-2011, 10:38 PM
  2. Replies: 5
    Last Post: 11-12-2010, 07:34 PM
  3. Replies: 4
    Last Post: 13-10-2010, 02:03 PM
  4. Replies: 5
    Last Post: 11-06-2010, 09:51 AM
  5. IS MITM, bhuwaneshwar GOOD?
    By tEcH mAsTer in forum Education Career and Job Discussions
    Replies: 4
    Last Post: 08-06-2010, 09:38 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,714,079,563.25082 seconds with 16 queries