Attacks on Wireless Connections
With more and more wireless networks coming online every day, it shouldn’t be much of a surprise that they’ve drawn the attention of the bad guys. Attacks on wireless connections come in several forms, such as leeching, cracking wireless encryption, rogue access points, and evil twin attacks.
Leeching
Leeching is using another person’s wireless network without that person’s permission. Leeching takes some of the bandwidth the other person has paid for, so it’s simply theft with another name.
In the heady early days of Wi-Fi networks, people would seek out unprotected networks by using sniffer hardware and cruising neighborhoods. This process, called war driving, often resulted in marks or symbols stenciled ...