Wireless Hacking
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Active In SP

Posts: 10
Joined: Dec 2009
03-01-2010, 08:41 AM

can you post more about Wireless Hacking topic?
Active In SP

Posts: 247
Joined: Jan 2010
05-01-2010, 04:56 PM

Wireless local area networks also called WLAN or Wi-Fi are widespread these days. They offer convenience, mobility, and can even be less expensive to implement. Wireless networks are based on the IEEE 802.11 set of standards for WLANs.IEEE 802.11 working group and the Wi-Fi Alliance are working at developing WLANs.

Wireless Hacking
physical security weaknesses, encryption flaws,
and authentication problems, have been discovered in the wireless networks.
Wi-Fi Protected Access (WPA): of Wi-Fi Alliance, and IEEE 802.11i (referred to as WPA2) of IEEE are developed for defending against attackers.
Risks associated with vulnerable wireless networks are:
-Full access to files being transmitted
-Intercepted e-mails
-Stolen passwords
-Denial-of-service attacks
-Back-door entry points
-Zombies: A hacker using your system to attack other networks

The various kinds of attacks mounted in wireless hacking are:
1)Non-technical attacks
These exploit human weaknesses, like the lack of
awareness, carelessness, and being too trusting of strangers. Often the easiest. These attacks include:
-Social engineering attacks whereby hackers disguise and get out too much information from you about your network.-
-Breaking into unsecured wireless devices
-Physically accessing APs, antennae, and other wireless infrastructure
equipment to reconfigure it

2)Network attacks
These include:
-Jamming RF signals
-Capturing data off the network from a distance
-Installing rogue wireless APs
-Exploiting network protocols such as SNMP
-denial-of-service (DoS) attacks
-Attacking the networking transactions by spoofing MAC addresses

3)Software attacks
-Hacking the operating system and other applications on wireless-client
-Cracking WEP keys and entering network's security system
-Breaking in via passwords and SSIDs
-exploiting weak network-authentication systems and gaining acces

full seminar and presentation report can be obtained from this link:
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ieee seminar paper on wireless tachometer pdf Guest 1 93 31-10-2016, 11:14 AM
Last Post: amrutha735
  wireless fingerprint attendance system based on zigbee technology seminar ppts Guest 1 65 29-10-2016, 03:39 PM
Last Post: amrutha735
  documentation on intelligent wireless video cameras Guest 1 85 29-10-2016, 02:56 PM
Last Post: amrutha735
  arun kumar notes on wireless communication 8th sem ece Guest 1 111 29-10-2016, 11:44 AM
Last Post: jaseela123
  wireless communication by arun vtu Guest 1 59 29-10-2016, 11:44 AM
Last Post: jaseela123
  arun kumar notes on wireless communication 8th sem ece Guest 1 195 29-10-2016, 11:09 AM
Last Post: ijasti
  mpt myanmar mobile phone bill hacking Guest 1 176 12-10-2016, 09:13 AM
Last Post: amrutha735
  wireless telemetry for electronic pill technology ppt Guest 1 77 11-10-2016, 04:27 PM
Last Post: amrutha735
Thumbs Up wireless voice communication between solar panel and laser miniproject doucment Guest 1 74 11-10-2016, 03:05 PM
Last Post: amrutha735
  wireless helth monitoring system in hospitals extc final year projects synopsis pdf Guest 1 52 11-10-2016, 02:03 PM
Last Post: amrutha735