X hits on this document





1 / 12

Wireless Hacking Tools


Wireless Hacking Tools

Author: Michael Roche mroche@wustl.edu


This paper is a survey of wireless attack tools focusing on 802.11 and Bluetooth. It includes attack tools for three major categories: confidentiality, integrity, and availability. Confidentiality attack tools focus on the content of the data and are best known for encryption cracking. Integrity attacks tools focus on the data in transmission and include frame insertion, man in the middle, and replay attacks. Finally, availability attack tools focus on Denial of Service (DoS) attacks.

Table of Contents

1.0 Introduction 1.1 Wireless Attack Tools 2.0 Confidentiality Attacks 2.1 Confidentiality Attack Tools 3.0 Integrity Attacks 3.1 Integrity Attack Tools 4.0 Availability Attacks 4.1 Availability Attack Tools 5.0 Bluetooth Attacks 5.1 Bluetooth Attack Tools Summary References List of Acronyms

1.0 Introduction

There are three main principles to computer network security. They are confidentiality, integrity, and availability. All three concepts are needed, to some extent, to achieve true security. Not using all three concepts in the security of the network will leave it vulnerable to attacks. Attackers strive to compromise one or more of the three main security principles. [1]

The basic definition of confidentiality is assuring that sensitive information will be kept secret and access limited to the appropriate persons. In network security, confidentiality can be achieved with data encryption. Data encryption scrambles plaintext data into unreadable cipertext data.

Integrity can be defined as unimpaired, complete, undivided, or unbroken. In network security this means that the message has not been tampered. No portion of the message has been removed, rearranged, or changed. The basic security measure to ensure integrity is to generate a cryptographic checksum of some sort to guarantee the message is unaltered.

Finally, availability means that data should be accessible and usable upon demand by an authorized user or process. An availability attack consists of some sort of Denial of Service (DoS) attack. A DoS attack prevents the user or device from accessing a particular service or application.

1 of 12

12/19/2007 5:16 PM

Document info
Document views41
Page views41
Page last viewedFri Jan 20 02:19:25 UTC 2017