Preview

War Driving Attack

Powerful Essays
Open Document
Open Document
4214 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
War Driving Attack
Network Attack Assignment (B) | May 7 | | |

Table of Contents Table of figures 2 Introduction 3
Brief History 3
Tools used to War Drive 4 Why War Dialling? 4 T.J.Maxx Hacked 4
Legality United States 6
Legality United Kingdom 7
T.J. Maxx response 7 The Bust! 8 Conclusion 10 Works Cited 13 Appendix A 14
Vulnerability Note VU#723755 14

Table of figures Figure 1 Albert Gonzalez 4 Figure 2 Wireless Manufactures vulnerable 12

Introduction

The organisational security is locked down. No more false alarms at 4:00am, of an impending internet intrusion. Thanks to a well-configured firewall, you 're stopping a large percentage of the causes of network breaches -- but despite the organisational security precautions. The problem is not with your firewall, these network-level security devices are designed for perimeter protection, and by definition they cannot stop attacks that originate inside your network!
WAR DRIVING (access point mapping)
What is War Driving? Or access point mapping, is the act of locating and exploiting Wi-Fi connections. This is achieved by the means of driving around, until the hacker finds a wireless access point, they wish to compromise. War Driving is accomplished due to Wireless LANs that have a range that exceeds the perimeter of the organisation. Due to this an intruder may gain access to corporate information, or cause malicious intent.

Brief History

The term derives from a somewhat similar approach to breaching telephone systems named War Hammering. Hammering is the act of using a modem connected to a computer running a script which allows the computer to call numbers.
A War Hammering exploit would consist of the computer setup to automatically call numbers within a certain area. The modem would wait for one or two rings, since answering computers attached to modems would pick up on the first ring. If the phone rang more than once, it would simply hang up and try the next number until a



Cited: Collins, T. (2000, October 7th). What is a Virtual Private Network (VPN). Retrieved April 19th, 2012, from Tech Target: http://searchenterprisewan.techtarget.com/definition/virtual-private-network Farmer, R ICO.Gov.uk. (2012, Unknown Unknown). Information security (Principle 7). Retrieved April 25th 10th, 2012, from Information Commissioners office: http://www.ico.gov.uk/for_organisations/data_protection/the_guide/principle_7.aspx Julian Oracle. (2010). Massachusetts Data Security Law, Signals New Challenges in Personal Information Protection. 6-7. Rouse, M. (2010, November 20th). privilege escalation attack. Retrieved April 20th, 2012, from Tech Target: http://searchsecurity.techtarget.com/definition/privilege-escalation-attack Search Security Tech Target Search Security Tech Target. (2007, May 11th). Defense in-depth. Retrieved April 1st , 2012, from Tech Target: http://searchsecurity.techtarget.com/definition/defense-in-depth Verini, J

You May Also Find These Documents Helpful

  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Bevis, J. (2007, July 12). Security Threats Statistics - Resources. Retrieved March 19, 2011, from InfoSecAlways.com: http://infosecalways.com/2007/07/12/security-threat-statistics-resources/…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Good Essays

    It 244 Week 1 Checkpoint

    • 721 Words
    • 3 Pages

    Mark S Merkow, Jim Breithaupt. (2006). Information Security. Principles and Practices- Chapter 4. Retrieved from Mark S Merkow, Jim Briethaupt, IT244-Intro to IT Security.…

    • 721 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cyp 3.2 A4.1

    • 685 Words
    • 3 Pages

    AC4.2 Explain the implications of confidentiality and data protection legislation for the collection, storage and use of customer information.…

    • 685 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    NT2580 Introduction to Information Security Unit 1 Information Systems Security Fundamentals © ITT Educational Services, Inc. All rights reserved. Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. NT2580…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Business Admin Nvq 2

    • 3880 Words
    • 16 Pages

    3. Data Protection Act 1998, this deals with confidentiality, storage and access to personal data.…

    • 3880 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Everyone who is responsible for using data has to follow strict rules called ‘data protection principles’. They must make sure the information is:…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Level 3 Ptlls Unit 001

    • 1754 Words
    • 8 Pages

    - The Data Protection Act 1998 is a framework to protect the rights of peoples personal data and is designed to safeguard…

    • 1754 Words
    • 8 Pages
    Best Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    http://sdi.sagepub.com/ Of 'true professionals ' and 'ethical hero warriors ': A gender-discourse analysis of private military and security companies…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Robinson, E. (2012, September 20). What is a computer hacker [Blog post]. Retrieved from http://blog.lifestore.aol.com/2012/09/20/what-is-a-hacker/…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Buddhism and Daoism

    • 781 Words
    • 4 Pages

    Buddhism and Daoism are both religions of the Chinese people. These are two of many religions of the massive world we live in. each of them are distinctive, but greatly influenced the lives of their followers and the society in which the belief systems are practiced. Buddhists follow the Four Noble Truths and the Taoists follow the Four Major Taoist Principles.…

    • 781 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cyber Warfare

    • 896 Words
    • 4 Pages

    “Cyber warfare is a term used to describe the use of the Internet to wage war in the virtual world, often with real effects in the physical world,” (McGuigan). In the past recent years, cyber warfare has become a pertinent issue among the major nations on the planet; this issue has forced militaries, all over the world, to incorporate a new branch that is devoted to both conducting and protecting against cyber warfare. Cyber warfare is also used to define attacks amongst corporations, form radical organizations, and/or attacks by hackers, who are perceived as being warlike in their intent. Most situations pertaining to cyber warfare are attacks from one “sovereign state,” to another virtually in cyberspace (McGuigan).…

    • 896 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    finger

    • 1966 Words
    • 8 Pages

    Cryptography and Network Security -W. Stalling (4th Ed.) Hoon-Jae Lee CNSL Cryptography and Network Security Lab. hjlee@dongseo.ac.kr http://kowon.dongseo.ac.kr/~hjlee http://crypto.dongseo.ac.kr…

    • 1966 Words
    • 8 Pages
    Satisfactory Essays