Wireless DOS attacks

While the Security of Wireless networks are improving, they are still very susceptible to DOS attacks and I doubt that will change anytime in the near future.

  • RF jamming and overloading the network with traffic. On the physical layer these attacks are pretty devastating due to their effectiveness and ease to which they are done. Hint: you can use a mobile phone for that.
  • Hidden Node problem: Well actually that’s a misconception, Its the use of the RTS/CTS (request to send /clear to send) which is used to SOLVE he hidden node problem that’s the issue. It can be used to DOS the network as the request to send basically stops the traffic till they hear the CTS signal.
  • WPA: This DOS attack can be used in WPA and WPA2, which my lecturer describe as “cute” involves the MIC (WPA improvement from WEP’s CRC). Basically if you introduce packets with incorrect MIC values then the Access Point will boot everyone off the network for one minute. Fun! I’m not sure if its dependent on implementation but it wouldn’t hurt for you to try this and see for yourself (well for at least a minute anyways hehe).

For more details:

Leave a Reply