Engineering in Your Pocket: Vulnerabilities? With Nessus
Engineering in Your Pocket: Vulnerabilities? With Nessus
Login
# $ &
written 18 months ago by modified 18 months ago by
• 100
stanzaa37 290
Sanket Shingote
Vulnerabilities? With
Nessus
Pro, You'll Always Know
Leader in Vulnerability Risk Management Wave
Report Q4 2019
tenable.com
OPEN
Topic:
Topic:Security Issues in Wireless Network
Di!iculty: Medium
• 100
stanzaa37
Replay
Replay: A replay attack has the same objectives as
the Man-in-the-Middle and the session hijacking, but
this attack happens o!line, rather than in real time.
The attacker can capture data of a session and can
use it later to exploit the victim’s information.
Modification of messages
messages: In this attack, some
part of the message is modified (deleted or added),
recorded or delayed so as to produce an
unauthorized result.
Passive Attacks:
Tra!ic analysis
analysis: The first step to any type of
hacking is foot printing and wireless foot printing is
done by carrying out tra!ic analysis. The attackers
before mounting an active attack have to obtain
su!icient information about the network This
operation of tra!ic analysis gives the attacker some
basic information about the network, like, the
network activity going on, the protocols being used
by the network and also the active access points
(AP’s) of the network.
Service Interruption
Interruption: In this attack the system
resources are destroyed or service to the network is
made unavailable by either increasing the load on
the service network by making fake requests to
connect to the network or by destroying the
resources.
Integrity
Integrity: This feature indicates that only authorized
users can insert, delete or modify the network
system data in an authorized manner. Integrity is
related to error correction and protection of
resources.
Next up
Search
Know More
Engineering in your
pocket
Download our mobile app and study
on-the-go. You'll get subjects,
question papers, their solution,
syllabus - All in one app.