Network Security Protocol Exploits

In addition to exploiting clients and infrastructures, cybercriminals can (and do) exploit network protocols and services. This is especially effective when network security protocols and services can be spoofed. In that scenario, the very foundation of an organization’s security is used against itself.

RADIUS Impersonation

The preceding section outlined how a hacker could use a rogue access point to direct traffic to a false DNS server. Along those same lines, FreeRADIUS is a tool that enables a rogue access point to intercept and capture clients’ logon credentials by passing the RADIUS authentication requests to a rogue host running FreeRADIUS. Packages such as PwnSTAR and easy-creds can automate the setup ...

Get Wireless and Mobile Device Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.