Since corporations are becoming more disciplined with strengthening their wireless networks, trends show that wireless users have become the easiest target. Forcing secure Wi-Fi usage when it concerns human behavior is hard.
The normal wireless user is really not familiar with the threats imposed by connecting to an open Wi-Fi network at a local coffee shop or airport. Sometimes, users may inadvertently connect to a wireless network that they think is the true access point but that has, in reality, been set up as a honeypot or open network specifically to pull unsuspecting fools.
For example, a normal user may have a network at home named [“ADSL”][1]. As a result, their device may automatically connect to any other network known as “ADSL.” This built-in function can lead to an unintended connection to a malicious wireless network, more commonly referred to as wireless phishing.
Once an attacker obtains access to the user’s device, not only could the attacker steal data such as sensitive files, but the attacker could also collect wireless network credentials for the user’s corporate network. This attack may be far simpler to do than attacking the organization network directly. If an attacker can gain the credentials from a wireless user, he or she can then use those credentials to access the organization enterprise wireless network, bypassing any encryption or safety mechanisms applied to stop more sophisticated attacks.
[1] https://en.wikipedia.org/wiki/Asymmetric_digital_subscriber_line
Not indicating that the content you copy/paste is not your original work could be seen as plagiarism.
Some tips to share content and add value:
Repeated plagiarized posts are considered spam. Spam is discouraged by the community, and may result in action from the cheetah bot.
Creative Commons: If you are posting content under a Creative Commons license, please attribute and link according to the specific license. If you are posting content under CC0 or Public Domain please consider noting that at the end of your post.
If you are actually the original author, please do reply to let us know!
Thank You!
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://latesthackingnews.com/2017/09/19/wireless-phishing/
Congratulations @sathishs! You have completed some achievement on Steemit and have been rewarded with new badge(s) :
You made your First Comment
Award for the number of upvotes received
Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here
If you no longer want to receive notifications, reply to this comment with the word
STOP
Congratulations @sathishs! You have completed some achievement on Steemit and have been rewarded with new badge(s) :
Award for the number of upvotes
Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here
If you no longer want to receive notifications, reply to this comment with the word
STOP