Wireless Hacking Tools
Author: Michael Roche mroche@wustl.edu
Abstract:
This paper is a survey of wireless attack tools focusing on 802.11 and Bluetooth. It includes attack tools for three major categories: confidentiality, integrity, and availability. Confidentiality attack tools focus on the content of the data and are best known for encryption cracking. Integrity attacks tools focus on the data in transmission and include frame insertion, man in the middle, and replay attacks. Finally, availability attack tools focus on Denial of Service (DoS) attacks.
Table of Contents
- 1.0 Introduction
- 1.1 Wireless Attack Tools
- 2.0 Confidentiality Attacks
- 2.1 Confidentiality Attack Tools
- 3.0 Integrity Attacks
- 3.1 Integrity Attack Tools
- 4.0 Availability Attacks
- 4.1 Availability Attack Tools
- 5.0 Bluetooth Attacks
- 5.1 Bluetooth Attack Tools
- Summary
- References
- List of Acronyms
View the complete report online
Download the report in PDF format
Back to Raj Jain's Home Page