Types of Wireless and Mobile Device Attacks


SMiShing

With the widespread usage of cellphones, smishing has grown more prevalent. Short Message Service (SMS) is used by SMiShing to transmit fraudulent text messages or links. By calling, the crooks deceive the user. Victims may provide sensitive information like credit card numbers, account numbers, and so on. When a user visits a website, he or she may unwittingly download malware that infects the device.

War Driving

War driving is a method employed by attackers to locate entrance points wherever they are. They may drive about and acquire a massive quantity of information in a short period of time because of the availability of free Wi-Fi.

WEP attack

WEP is a security standard that attempts to offer the same level of protection for a wireless local area network as it does for a wired LAN. WEP aims to offer comparable protection for data transferred through WLAN using encryption, as physical security measures assist to secure a wired LAN.

WEP encrypts data with a key. With Wired Equivalent Privacy, there is no provision for key management, therefore the number of persons sharing the key will continue to rise. The criminal has access to a big volume of traffic for analytic assaults because everyone is using the same key.

WPA attack

Wi-Fi Protected Access (WPA) and subsequently WPA2 were developed to replace WEP as better technologies. Because an attacker cannot recover the key by observing traffic, WPA2 does not have the same encryption issues. Because cyber thieves may examine the packets sent between the access point and an authorized user, WPA2 is vulnerable to attack.

Bluejacking

Bluetooth is a high-speed, short-range wireless technology that allows data to be exchanged between desktop and mobile computers and other devices.

Replay attack

An attacker spies on information being transmitted between a sender and a recipient in a replay attack. Once the attacker has spied on the data, he or she can intercept it and retransmit it, causing data transmission to be delayed. Playback assault is another name for it.

Bluesnarfing

When an attacker steals the victim's information from his device, this is known as bluesnarfing. An attacker can gain access to a user's calendar, contact list, e-mail, and SMS messages without leaving any trace of the intrusion.

RF Jamming

Electromagnetic and radio-frequency interference can interfere with wireless transmissions. Radio Frequency (RF) jamming distorts a satellite station's broadcast, preventing the signal from reaching the receiving station.

Updated on: 28-Oct-2021

2K+ Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements