90 likes | 207 Vues
This outline explores the evolving role of hackers within WLAN environments, detailing their tasks and procedures for launching attacks, such as Denial of Service (DoS) and user credential theft. It covers the methods hackers use to modify information, masquerade identities, and alter message streams. Additionally, the document explains how hackers identify target machines, assess risks, and exploit vulnerabilities using specific tools. Understanding these tactics is crucial for improving WLAN security and recognizing potential threats in modern network systems.
E N D
SECURITYHACKER’S ASPECT IN WLAN ENVIRONMENT 通工所 研二 691430042 楊川民
Outline • Hacker’s evolvement • Hacker’s task • Hacker’s procedure • Attack (DOS) AP • Attack (steal) user ID and password
Hacker’s task • Modification of information • Masquerade • Message stream modification • Disclosure
Attacker Procedure • Identify machine that you want to attack • Estimating the risk and cost • Use tools that test weakness in the machine • Start attack
AP request Attacker Access Point (DOS) impact Hacker
Send ID and password AP Authorization and serve request WLAN Environment
AP Send ID and password Authorization and serve request HACKER request Send ID and password Attack WLAN Environment