security hacker’s aspect in wlan environment 通工所 研二 691430042 楊川民

Post on 03-Jan-2016

242 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

SECURITYHACKER’S ASPECT IN WLAN ENVIRONMENT

通工所 研二 691430042 楊川民

Outline

Hacker’s evolvement Hacker’s task Hacker’s procedure Attack (DOS) AP Attack (steal) user ID and password

Evolvement

Past Now Future

Hacker’ group

Professional Student Baby

Tools Complex program

Simple tools

GUI

Cost Less Large Very large

Hacker’s task

Modification of information Masquerade Message stream modification Disclosure

Attacker Procedure

Identify machine that you want to attack

Estimating the risk and cost Use tools that test weakness in

the machine Start attack

Attacker Access Point (DOS)

AP

Hacker

request

impact

WLAN Environment

AP

Send ID and password

request

Authorization and serve

APAttack WLAN Environment

HACKERrequest

request

Send ID and password

Send ID and password

Authorization and serve

top related