A Technical Overview of Hacking
Wireless Network Viruses
Viruses exist that are speciﬁ cally designed to leverage
the strengths and weaknesses of wireless technologies.
Wireless viruses are different because they can replicate
quickly using the wireless network, jumping from system
to system with relative ease. For example, a virus known
as MVW-WIFI can replicate through wireless networks
by using one system to detect other nearby wireless
networks; it then replicates to those networks, at which
point the process repeats.
Protection on a wireless network is absolutely essential to consider and consider carefully.
There are several techniques that you may use to protect yourself and your employees
from harm, these include:
• Firewalls—In the case of roaming or remote clients that connect to wireless
networks at the ofﬁ ce or at the local coffee shop or airport, a good personal ﬁ rewall
can provide a much needed level of protection.
• Antivirus—An antivirus should be installed on every computer, and a wireless
client is no exception, especially due to its higher exposure to threats.
• VPN—A virtual private network can enhance protection to a high degree
by encrypting all trafﬁ c between the roaming client and the company network.
By using this technique it is possible to work on a wireless network that has
no protection itself and provide this through the VPN.
Wireless Hacking Tools
There are a number of wireless hacking tools available to the attacker who wants
to break into or discover wireless networks. Some of the more common ones include:
• Medieval Bluetooth Scanner
• CFI LANguard Network Security Scanner
While wireless viruses are restricted
to 802.11 networks, they can and
have appeared on other wireless
technologies, including Bluetooth
devices. In concept, 802.11 viruses
and Bluetooth are the same, but the
difference in practice is how they
use their underlying technologies
(wireless or Bluetooth).