Rogue Access Point Attacks - Wireless Security

What is Rogue Access Point Attacks?

When we think about corporate networks, the corporate WLAN is an authorized and secured wireless portal to the network resources. A rogue access device (AP) is any WLAN radio that is linked to the company community (most usually to a few network transfers) without the authorization.

Most of the rogue access factors that are hooked up via personnel (malicious customers or by using mistake) are sincerely no longer the same AP's that the IT department in the agency is the use of; however some Small-office home-office (SOHO) Wi-Fi routers - the same ones, which you possibly have at home. In the situation when they're misconfigured or configured without any security - it opens a subsequent attack surface for having clean access to a very at ease community).

With the current evolution of the IT industry, the rogue access point might be thoroughly hidden and extraordinarily tough to locate. Might you be able to easily spot a Raspberry Pi linked on your network switch if it would be located behind the rack hidden in between hundreds of network cables? I can definitely say, you would not spot it at all!

rogue_access_point

If the network resources are exposed by a rogue access point, the following risks may be identified −

  • Data Theft − Corporate data may be compromised.
  • Data Destruction − Databases may be erased.
  • Loss of Services − Network services can be disabled.
  • Malicious Data Insertion − An attacker may use a portal to upload viruses, key loggers or pornography.
  • 3rd Party Attacks − A company's wired network may be used as a launching pad for 3rd party attacks against other networks across the internet.

All rights reserved © 2020 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status

Wireless Security Topics