In addition, a blogger can achieve an anonymous MAC address without purchasing anything and with minimal computer knowledge by a process known as MAC spoofing
Attacks such as MAC spoofing
and denial of service can be launched selectively on a client or an AP for potentially disrupting the entire WLAN.
535 Man-in-the-Middle attacks -- 200 denial of service attacks -- 270 rogue APs -- 750 wireless bridges -- 2,090 AP MAC spoofing
attempts -- Numerous impersonation attacks, IP spoofing, and syn floods.
As part of the implementation, engineers also added security measures to go beyond the wireless and networking equipment's standard protections, shielding Mobile's Wi-Fi users against identity theft, MAC spoofing
and other threats.
In response to MAC spoofing
, another method has evolved, providing more reliable results.
With MAC spoofing
, wireless hacking, and unapproved connections constantly bombarding today's wireless networks, AirMagnet's products are a valuable weapon in the armament available to IT professionals," notes Frost & Sullivan Research Analyst James Brehm.
The system provides Sandia with rogue AP detection and destruction, AP and station impersonation detection and prevention, ad hoc network protection, AP denial of service (DoS) protection, and protection against other wireless attacks such as man-in-the middle and MAC spoofing
New security and policy features to protect against MAC spoofing
and avoid static IP address mapping of web destinations
Whereas last year we noted basic denial of service and MAC spoofing
attacks, this year hackers have moved on to what we refer to as level three attacks, where hackers are actually injecting traffic into the network and manipulating data.
Rogue wireless LANs; * Network scans; * Fault diagnostics, traffic bottlenecks and other performance issues; * Attacks such as MAC spoofing
, Denial-of-Service attacks, Man-in-the- Middle attacks and identity thefts; and * An overall vulnerability assessment of unencrypted traffic, ad hoc networks, Soft APs and more.
The wireless attacks we saw--jamming, de-authentication, denial-of-service, MAC spoofing
, fake and soft APs--were to be expected, particularly at a hacker conference," said Bruce Hubbert, an AirMagnet engineer who attended DefCon.
A wired side approach to wireless security with polling and traditional IDS cannot detect identity theft, MAC spoofing
of access points, unauthorized associations or 'soft access points' that are actually laptops that act as fully functioning access points.