Attacks on Wireless Connections
With more and more wireless networks coming online every day, it shouldn’t be much of a surprise that they’ve drawn the attention of the bad guys. Attacks on wireless connections come in several forms, such as leeching, cracking wireless encryption, rogue access points, and evil twin attacks.
Leeching
Leeching is using another person’s wireless network without that person’s permission. Leeching takes some of the bandwidth the other person has paid for, so it’s simply theft with another name.
In the heady early days of Wi-Fi networks, people would seek out unprotected networks by using sniffer hardware and cruising neighborhoods. This process, called war driving, often resulted in marks or symbols stenciled ...

Get Mike Meyers’ CompTIA Network+ Certification Passport, 4th Edition (Exam N10-005), 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.