• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 14. Securing Your Privacy Using ... > Sniffing, Interception, and Monitori...

Sniffing, Interception, and Monitoring

Much in the same way that an attacker can sniff network traffic on a wire, an attacker can also passively intercept wireless network traffic. Then, through packet analysis, he might be able to determine login IDs and passwords and collect other sensitive data using wireless packet sniffers. The ease with which intruders can penetrate a wireless network is now being made easier with the release of several software applications that allow intruders to passively collect data for real-time or later analysis. This kind of analysis can compromise the network.

Examples of wireless sniffing software include Airopeek, AirSnort, NetStumbler, and WEPCrack. AirSnort is an application that utilizes known WEP flaws to extract the WEP key and allows for unauthorized network access. NetStumbler is a wireless sniffer that logs an extensive amount of information about any wireless network it happens to encounter. NetStumbler is able to grab information such as MAC address of the access point, network name, SSID, manufacturer, channel in use, signal strength, and whether WEP is enabled. An intruder wanting to attack a target wireless network can make use of all of this information.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint