Course Overview
1.0: Threats, Attacks, and Vulnerabilities
Section 1.0: Test Your Knowledge
Section 1.0: Identifying Scenario & Questions
2.0: Technologies and Tools
Section 2.0: Test Your Knowledge
Section 2.0: Identifying Scenario & Questions
3.0: Architecture and Design
1 of 3

1.2.5 Wireless Attacks

wireless attack is a malicious action against wireless system information or wireless networks; examples can be denial of service attacks, penetration, and sabotage.





This wireless attack takes any data a user enters and the attacker changes the information to his/her benefit.  

Initialization Vector (IV)

An attack on wireless networks. It modifies the Initialization Vector (IV) of an encrypted wireless packet during transmission. Once an attacker learns the plaintext of one packet, the attacker can compute the RC4 key stream generated by the IV used.

The attacker targets a user encrypted wireless packet and then once the attacker access the plain-text of the packet, he or she can bypass the RC4 key stream generated by the encrypted wireless packet. 

Evil twin

This wireless attack copies a target users SSID (Service Set Identifier) in hopes of looking like a real Access Point. 

Rogue AP

This wireless attack is pretty much open to anyone who feels they want to make another access point without permission. 


This wireless attack is intended to stop service on a home modem for an example. It will transmit noise on the same frequency in hopes of stopping the service.


The WPS is the setup most if not everyone has in the office or at home. Brute Force can discover the configuration settings on Wi-Fi Protected Setups which makes Wi-Fi easy for a wireless attack. 


This wireless attack can send any unsolicited content possible through messages to any device that has Bluetooth capabilities. 


This wireless attack is opposite of bluejacking because instead of sending unsolicited items to Bluetooth capable devices, you can gain access to any Bluetooth capable device. 


This wireless attack targets specifically radio-frequency identification systems but uses common methods already discussed. 


A type of denial of service (DoS) attack that targets communication between a user (or all users) and a Wi-Fi access point.

This attack sends disassociate packets to one or more clients which are currently associated with a particular access point.

This wireless attack breaks up communication of one or more devices that are talking on the same Wi-Fi Access Point.

We Don't Want You TO GO!

Try a couple of our sample lessons. This is our gift to you!

Take A Jab At It!

Test Your Skills
Free Today!

If you don’t do well on this FREE quiz we just ask you come back and let us help you learn and gain your Certification.