Curriculum
Course: Cyber Security
Login

Curriculum

Cyber Security

Text lesson

CS Wi-Fi Attacks

A critical aspect of computer security is Wi-Fi, as devices and systems no longer need physical cables for connectivity and can be accessed by anyone within the signal range. Wi-Fi allows a wide array of devices to connect and communicate over a network.

WIFI Basics

Wi-Fi, commonly recognized, is based on the IEEE 802.11 protocol, but there are other radio-based communication protocols, such as:

  • Bluetooth: Used for connecting devices like smartphones and headphones.
  • NFC (Near Field Communication): Used in access badges and credit cards for short-range data transmission.
  • RFID (Radio Frequency Identification): Utilized for access cards and devices, such as cars transmitting identifiers to toll systems.
  • ZigBee and Z-Wave: Commonly used in enterprise and home automation.

Wireless communication usually occurs through an Access Point (AP), which acts as a base station and router for client connections, though peer-to-peer communication is less common. The wireless network is identified by its SSID (Service Set Identifier). Because Wi-Fi signals are broadcasted to nearby areas, attackers can easily use antennas to “sniff” communications and capture packets. Wi-Fi can grant access to internal applications, increasing attack risks. Additionally, Wi-Fi devices often have management interfaces and firmware with vulnerabilities that may not be patched as quickly as other enterprise assets.