Fiveable

🔒Network Security and Forensics Unit 6 Review

QR code for Network Security and Forensics practice questions

6.5 Wireless attacks and vulnerabilities

🔒Network Security and Forensics
Unit 6 Review

6.5 Wireless attacks and vulnerabilities

Written by the Fiveable Content Team • Last updated September 2025
Written by the Fiveable Content Team • Last updated September 2025
🔒Network Security and Forensics
Unit & Topic Study Guides

Wireless networks offer convenience but come with unique security challenges. From rogue access points to sniffing attacks, these networks face various threats that can compromise data and privacy. Understanding these vulnerabilities is crucial for implementing effective security measures.

This section explores common wireless attacks, tools used by attackers, and best practices for securing wireless networks. It covers encryption protocols, detection techniques, and forensic approaches to investigate wireless incidents and maintain network integrity.

Types of wireless networks

  • Wireless networks enable devices to connect and communicate without physical wired connections, providing flexibility and mobility for users in homes, offices, and public spaces
  • Different types of wireless networks exist, including Wireless Local Area Networks (WLANs), which cover a limited area, and Wireless Wide Area Networks (WWANs), which span larger geographic regions
  • Common wireless network technologies include Wi-Fi, Bluetooth, and cellular networks (3G, 4G, 5G), each with their own characteristics, range, and use cases in the context of network security and forensics

802.11 wireless standards

  • The IEEE 802.11 family of standards defines the protocols and specifications for implementing wireless local area networks (WLANs)
  • Different 802.11 standards (a, b, g, n, ac, ax) operate on various frequency bands (2.4 GHz, 5 GHz, 6 GHz) and offer increasing data rates and improved features
  • Understanding the capabilities and limitations of each 802.11 standard is crucial for assessing the security posture and potential vulnerabilities of wireless networks

Wireless network components

Access points

  • Wireless access points (APs) are central devices that allow wireless clients to connect to a wired network, acting as a bridge between the wireless and wired segments
  • APs broadcast a Service Set Identifier (SSID) to announce the network's presence and enable client devices to discover and associate with the wireless network
  • Configuring and securing access points is essential to prevent unauthorized access and protect the integrity of the wireless network

Wireless NICs

  • Wireless Network Interface Cards (NICs) are hardware components that enable devices (laptops, smartphones, tablets) to connect to wireless networks
  • Wireless NICs can operate in different modes, such as infrastructure mode (connecting to an AP) or ad-hoc mode (directly connecting to other wireless devices)
  • The capabilities of wireless NICs (supported standards, antenna type, driver software) can impact the device's performance and susceptibility to wireless attacks

Antennas

  • Antennas are critical components that transmit and receive wireless signals, determining the range, coverage, and directionality of the wireless network
  • Different types of antennas, such as omnidirectional, directional, and sector antennas, are used depending on the desired coverage area and network topology
  • Antenna placement and orientation can affect the wireless network's performance and security, as well as its vulnerability to eavesdropping and interference

Wireless network security

WEP vulnerabilities

  • Wired Equivalent Privacy (WEP) is an outdated security protocol for wireless networks that has severe vulnerabilities and should no longer be used
  • WEP uses a static encryption key shared among all devices, making it susceptible to key recovery attacks using tools like Aircrack-ng
  • The small key size (40 or 104 bits) and weak initialization vector (IV) generation in WEP allow attackers to crack the encryption and gain unauthorized access to the wireless network

WPA vs WPA2

  • Wi-Fi Protected Access (WPA) and WPA2 are security protocols designed to address the weaknesses of WEP and provide stronger encryption and authentication
  • WPA uses the Temporal Key Integrity Protocol (TKIP) for encryption, while WPA2 employs the more secure Advanced Encryption Standard (AES) algorithm
  • WPA2 is the recommended security protocol for modern wireless networks, offering robust protection against various wireless attacks

WPA3 improvements

  • WPA3 is the latest security protocol for wireless networks, introducing several enhancements over WPA2 to further strengthen wireless security
  • WPA3 features Simultaneous Authentication of Equals (SAE), a more secure handshake process that protects against offline dictionary attacks
  • Other improvements in WPA3 include increased cryptographic strength, individualized data encryption, and better protection for open networks without passwords

Wireless threats

Rogue access points

  • Rogue access points are unauthorized wireless access points installed on a network without the knowledge or approval of the network administrator
  • Attackers can use rogue access points to lure unsuspecting users to connect, allowing them to intercept network traffic and steal sensitive information
  • Detecting and eliminating rogue access points is crucial for maintaining the security and integrity of a wireless network

Evil twin attacks

  • An evil twin attack involves an attacker setting up a malicious access point with the same SSID as a legitimate network to trick users into connecting
  • Once connected to the evil twin, users may be prompted to enter sensitive information (e.g., passwords) or have their traffic monitored and manipulated by the attacker
  • Educating users about verifying the authenticity of wireless networks and using secure connections (HTTPS) can help mitigate the risk of evil twin attacks

Wireless sniffing

  • Wireless sniffing involves capturing and analyzing wireless network traffic using specialized tools (e.g., Wireshark, Kismet) to gather information about the network and its users
  • Attackers can use wireless sniffing to intercept unencrypted data, such as login credentials, emails, and web traffic, compromising user privacy and security
  • Encrypting wireless traffic using strong protocols (WPA2, WPA3) and using virtual private networks (VPNs) can help protect against wireless sniffing attacks

Wardriving and warchalking

  • Wardriving is the act of searching for and mapping wireless networks from a moving vehicle, using a laptop, smartphone, or other wireless-enabled device
  • Warchalking involves physically marking the location of discovered wireless networks using chalk symbols, allowing others to easily find and potentially exploit these networks
  • Network administrators should be aware of wardriving and warchalking activities and take measures to secure their wireless networks against unauthorized access and potential attacks

Wireless attack tools

Aircrack-ng suite

  • Aircrack-ng is a popular suite of tools used for assessing the security of wireless networks and performing various wireless attacks
  • The suite includes tools for packet capture (Airodump-ng), traffic generation (Aireplay-ng), and password cracking (Aircrack-ng) to test and exploit wireless network vulnerabilities
  • Security professionals and network administrators can use Aircrack-ng to evaluate the strength of their wireless security measures and identify potential weaknesses

Kismet wireless detector

  • Kismet is an open-source wireless network detector, sniffer, and intrusion detection system that can identify and monitor wireless networks, including hidden and non-beaconing networks
  • It supports multiple wireless capture sources, such as Wi-Fi, Bluetooth, and software-defined radio (SDR), providing a comprehensive view of the wireless environment
  • Kismet can be used for wardriving, identifying rogue access points, and detecting wireless attacks, making it a valuable tool for wireless network security assessments

Reaver for WPS attacks

  • Reaver is a tool designed to exploit vulnerabilities in the Wi-Fi Protected Setup (WPS) feature found on many wireless routers
  • WPS allows users to easily connect devices to a wireless network using a PIN, but it has been found to be susceptible to brute-force attacks
  • Reaver can be used to perform online and offline WPS PIN attacks, enabling attackers to gain unauthorized access to wireless networks and highlighting the importance of disabling WPS or using strong PINs

Fern Wi-Fi cracker

  • Fern Wi-Fi Cracker is a wireless security auditing and attack tool that provides a user-friendly interface for performing various wireless attacks
  • It integrates several wireless attack tools, such as Aircrack-ng and Reaver, and automates the process of cracking wireless network passwords
  • Network security professionals can use Fern Wi-Fi Cracker to assess the resilience of their wireless networks against common attack techniques and demonstrate the potential impact of weak security configurations

Wireless attack techniques

Cracking WEP keys

  • Cracking WEP keys involves exploiting weaknesses in the WEP protocol to recover the encryption key and gain unauthorized access to the wireless network
  • Attackers can capture a sufficient number of wireless packets (typically around 50,000 to 200,000) using tools like Airodump-ng and then use Aircrack-ng to crack the WEP key
  • The relative ease of cracking WEP keys demonstrates the importance of upgrading to more secure wireless encryption protocols, such as WPA2 or WPA3

WPA/WPA2 cracking

  • WPA and WPA2 cracking involves attempting to guess the pre-shared key (PSK) used to secure the wireless network, which is often derived from a passphrase chosen by the user
  • Attackers can use dictionary or brute-force attacks to try common passwords and passphrases, or they can employ more advanced techniques, such as the PMKID attack or the Handshake Capture attack
  • To protect against WPA/WPA2 cracking, it is essential to use strong, complex passphrases and consider implementing additional security measures, such as MAC address filtering and 802.1X authentication

Deauthentication attacks

  • Deauthentication attacks exploit the 802.11 management frame used to terminate a connection between a wireless client and an access point
  • Attackers can send forged deauthentication frames to force clients to disconnect from the network, causing disruption and potentially allowing the attacker to capture the WPA/WPA2 handshake for offline cracking
  • Protecting against deauthentication attacks involves using strong encryption, enabling protected management frames (PMF) when supported, and monitoring the wireless network for suspicious activities

MAC spoofing

  • MAC spoofing involves changing the factory-assigned Media Access Control (MAC) address of a network interface card to impersonate another device or bypass MAC address filtering
  • Attackers can use MAC spoofing to evade access control mechanisms, perform man-in-the-middle attacks, or hide their true identity on the wireless network
  • Implementing strong authentication methods (e.g., 802.1X with EAP) and monitoring for MAC address anomalies can help detect and prevent MAC spoofing attacks

Wireless replay attacks

  • Wireless replay attacks involve capturing legitimate wireless traffic and retransmitting it to gain unauthorized access or manipulate network communications
  • Attackers can use tools like Aireplay-ng to capture and replay specific frames, such as authentication or association requests, to bypass security controls or perform session hijacking
  • Protecting against wireless replay attacks requires using strong encryption protocols (WPA2, WPA3) with secure key management and enabling replay protection mechanisms, such as the 802.11w standard for protected management frames

Wireless security best practices

Strong encryption protocols

  • Implementing strong encryption protocols, such as WPA2 or WPA3, is essential for protecting wireless networks from unauthorized access and eavesdropping
  • WPA2 with AES encryption provides robust security for wireless networks, while WPA3 offers enhanced protection against offline dictionary attacks and improved security for open networks
  • Regularly updating wireless routers and access points to ensure they support the latest security standards and have the most recent security patches is crucial for maintaining a secure wireless environment

Changing default settings

  • Changing default settings on wireless routers and access points is a critical step in securing wireless networks and preventing unauthorized access
  • Default settings to change include the SSID (network name), administrator password, and Wi-Fi password, as these are often well-known and can be easily exploited by attackers
  • Disabling features like WPS (Wi-Fi Protected Setup) and remote management can also help reduce the attack surface and minimize the risk of unauthorized access

Disabling unused services

  • Disabling unused services and features on wireless routers and access points can help minimize the potential for vulnerabilities and reduce the attack surface
  • Examples of services to disable include UPnP (Universal Plug and Play), SNMP (Simple Network Management Protocol), and telnet, which are often not required for normal operation and can be exploited by attackers
  • Regularly reviewing the enabled services and features on wireless devices and disabling those that are not necessary is an important aspect of maintaining a secure wireless network

Physical security measures

  • Implementing physical security measures is crucial for protecting wireless networks from unauthorized access and tampering
  • Measures include securing wireless routers and access points in locked rooms or enclosures, using tamper-evident seals, and restricting physical access to authorized personnel only
  • Regularly monitoring the physical environment for signs of tampering or unauthorized devices (e.g., rogue access points) is essential for detecting and responding to potential security breaches

Wireless intrusion detection

  • Wireless intrusion detection systems (WIDS) are designed to monitor wireless networks for unauthorized access attempts, rogue devices, and suspicious activities
  • WIDS can use techniques like radio frequency (RF) scanning, protocol analysis, and behavioral analysis to detect potential threats and alert network administrators
  • Implementing a WIDS and regularly reviewing alerts and logs can help identify security incidents early and enable prompt response and mitigation actions to protect the wireless network and its users

Wireless forensics

Capturing wireless traffic

  • Capturing wireless traffic is a fundamental step in wireless forensics, allowing investigators to collect evidence and analyze network communications
  • Specialized tools, such as Wireshark, Kismet, and Airodump-ng, can be used to capture wireless traffic, including 802.11 frames, management frames, and data packets
  • When capturing wireless traffic for forensic purposes, it is essential to ensure the integrity of the captured data by using write-protected storage media and documenting the chain of custody

Analyzing wireless packets

  • Analyzing wireless packets involves examining the captured traffic to identify relevant information, such as device identifiers, network configurations, and user activities
  • Tools like Wireshark and NetworkMiner can be used to filter and analyze wireless packets, extracting details like MAC addresses, SSIDs, encryption types, and application-layer data
  • Correlating wireless packet analysis with other sources of information (e.g., logs, system artifacts) can help investigators build a comprehensive understanding of the wireless network and its users

Detecting rogue devices

  • Detecting rogue devices is an important aspect of wireless forensics, as unauthorized access points or wireless clients can pose significant security risks and be indicative of malicious activities
  • Techniques for detecting rogue devices include comparing the observed wireless devices against an inventory of authorized devices, analyzing traffic patterns and behaviors, and using WIDS to identify suspicious activities
  • Investigating rogue devices can help determine their purpose, origin, and potential impact on the wireless network, as well as identify any associated malicious actors or activities

Investigating wireless incidents

  • Investigating wireless incidents involves applying forensic techniques to gather and analyze evidence related to security breaches, unauthorized access, or other malicious activities involving wireless networks
  • Key steps in wireless incident investigation include preserving volatile data (e.g., live memory), collecting relevant artifacts (e.g., logs, configuration files), and analyzing wireless traffic and device interactions
  • Conducting thorough wireless incident investigations can help organizations determine the scope and impact of security breaches, identify the root causes and attack vectors, and develop appropriate remediation and prevention strategies