LogoLogo
  • EnGenius Cloud Technology
  • EnGenius Cloud Services DataCenters
  • LLDP-MED
  • Presence Service
  • Captive Portal
    • Integrate with External Splash Page
      • Click-through
      • Sign-on Splash
      • Error Message
  • Zero-wait DFS
  • Security Access Points
    • Wireless Network Security Issues
    • Denial of Service and EnGenius Solution
    • Data Breach, Passcode Cracking, and the EnGenius Solution
    • EnGenius Solution and Benefits
  • AirGuard
    • Rogue AP
    • Rules and Classifications
    • Evil Twin
    • Malicious Attacks
    • RF Jamming
  • Fast Handover RSSI Thresholds
  • Authentication with Google Secure LDAP Server
    • Configure Google LDAP Authentication for Wireless Networks Access
    • Appendix
    • Troubleshooting
  • Authentication with Microsoft Active Directory (AD) Server for Wireless Users
    • Configure Active Directory Authentication for Wireless Network Access (SSID)
    • Behavior to Authenticate Users with Microsoft AD Server
    • Appendix
    • Troubleshooting
  • Configure SAML SSO with ADFS
  • Authentication with Microsoft Entra ID LDAP Server
Powered by GitBook
On this page
  • Denial of Service
  • Passphrase or Password Cracking
  • Data Breach

Was this helpful?

Export as PDF
  1. Security Access Points

Wireless Network Security Issues

There are three common security threats in WLAN

Denial of Service

A denial of service attack crowds the radio channel by sending out de-authentication or dis-association packets to prevent clients from connecting to the AP and accessing the network. An RF jammer is a tool typically used to jam the radio channel, so valid clients won’t be able to access the network. Rogue clients can also spoof the SSID and AP to de-authenticate or dis-associate legitimate clients.

Passphrase or Password Cracking

Hackers can sniff or eavesdrop over-the-air traffic to crack the PSK passphrase of an SSID and access the network. They can also break user credentials to change settings as an admin or access unauthorized resources as authorized users.

Data Breach

By spoofing a legitimate SSID or AP, hackers can leverage the rogue spoofing AP to collect user data. Common threats are from man-in-the-middle or evil twin attacks.

Last updated 3 months ago

Was this helpful?