Регистрация и размещение информации на сайте бесплатны. После того, как вы в первый раз войдете на сайт (сразу после регистрации), добавляйте вакансии, резюме, темы о обсуждения на форуме, информацию, статьи и многое другое.
Заказать перевод у нас

Наши услуги

Последняя информация
Реклама на сайте
Пожертвования
Если вы довольны, что нашли переводчика без посредников и хотите помочь развитию проекта, вы можете сделать пожертвование


Для перечисления пожертвований через Сбербанк используйте наш счет: 4276 8380 8927 3652
  Смотреть   Категории   Скорая помощь, нужна помощь знающих    

Форум
Мы помогаем друг-другу быть в курсе новостей, связанных с нашей профессией и всегда делимся переводческим опытом
Чтобы разместить свою тему на форуме, нажмите на одну из категорий ниже, после этого на кнопку \"Новая тема\".
Форум переводчиков » Скорая помощь, нужна помощь знающих

WiFi jamming attacks are easier and cheaper than ever

Темы: 9   Сообщения: 0
 A security researcher has shown that disrupting WiFi, Bluetooth, and ZigBee networks isn't difficult, but most importantly, wifi blocker is not as costly as you might think.

According to Mathy Vanhoef, a PhD student at KU Leuven (Belgium), this can be easily done with a $ 15 Wi-Fi dongle bought from Amazon, a Raspberry Pi board, and an amplifier that spans the range of the attack on some extended 120 meters.

wiFi and gps jammer

The attack would hit all devices within range that work in the 2.4 and 5 GHz bands.

Given that the above networks are critical to the functioning of many IoT devices and systems - home security systems, car locks, baby monitors, etc. - it should be clear that the fact that these attacks can be carried out so easily and cheaply , can lead to serious consequences.

In fact, cheap signal jammer is known to be already used by crooks around the world:

This is why it is important that defenders can detect these attacks if they continue, even if they cannot stop them.

During his recent presentation at BruCON, Vanhoef stated that by changing the dongle's firmware, he could force the target networks to always give priority to the device's transmissions. If the device is transmitting continuously, it means that all other devices cannot, effectively rendering the channel unusable.

His attempts at selectively jamming (blocking certain packets) were less successful, and he concluded that 100% reliable selective jamming is not possible.

He also says that these low-level jamming attacks could affect attacks on higher-level protocols. For example, he says they can be used to launch a channel-based MiTM attack against WPA's still widely used Temporal Key Integrity Protocol (TKIP).




Модераторы: Administrator, Administrator