Questions tagged [wireless]

Wireless security topics including 802.11, Bluetooth, and others.

Wireless security topics related to wireless systems like 802.11, Bluetooth, cellular, etc. Relevant topics (by wireless system) below:

802.11 WiFi

  • WEP
  • WPA
  • WPA2
  • WPA3
  • WPS
  • various attacks against the above, such as Evil Twin, brute force, etc.

cellular wireless systems

  • GSM
  • UMTS
  • LTE
  • 5G
  • various attacks against the above, such as rogue GSM base stations
469 questions
51
votes
7 answers

How would you detect an Evil Twin attack, especially in a new environment?

Let's say you are traveling, and you pause in the airport lounge, or your hotel lobby, or a nearby coffee shop. You haul out your laptop and scan the available wireless networks. You know the name of the wireless network because it is written behind…
J Kimball
  • 2,137
  • 1
  • 15
  • 19
15
votes
1 answer

Wireless mouse security

How secure are wireless mice? Is it possible to control a wireless mouse from a different computer? Is it possible to know the mouse movements from a different computer?
soandos
  • 533
  • 3
  • 14
13
votes
3 answers

Why does Evil twin works?

https://en.wikipedia.org/wiki/Evil_twin_%28wireless_networks%29 My question: it's OK that someone can make an AP with the same MAC and SSID as the original AP. And with stronger signal. But what I don't understand is how can a rogue AP be…
evachristine
  • 633
  • 5
  • 9
8
votes
1 answer

Free hotspot: Open wifi vs. WPA2 wifi with known password

If we would want to give internet for free via WIFI, then what would be the better option and why from a security standpoint if we could only choose between: A non-encrypted wireless network setup An encrypted wireless network setup with known…
thequestionthequestion
  • 1,201
  • 2
  • 11
  • 9
8
votes
4 answers

Password-less network in skyscraper office

If a company has offices way up in a skyscraper, is it acceptable to have an open network without a password, as an easy-to-use courtesy to visiting guests? The only ones that possibly would be able to leech off this would be the company on the…
forthrin
  • 1,821
  • 1
  • 14
  • 22
7
votes
4 answers

Is a wireless receiver a security weak point?

I have bought the Logitech Wireless Presenter R400, and it includes a Wireless receiver that it should be plugged in to the computer in order for the remote send signals to the computer. I would like to know if that receiver is a weak point that can…
Hanan
  • 1,119
  • 5
  • 12
  • 22
6
votes
2 answers

How to discover if there is someone else connected to my wireless router?

I have a wireless router (WPA/WPA2) that is connected to my modem, so I can use wi-fi internet on my laptop. So, I'd like to know if there is any tool that allows me to discover if there is someone connected to my wireless router and if this tool…
Zignd
  • 171
  • 1
  • 1
  • 5
6
votes
3 answers

How to setup a Virtual Wireless Router?

I need to teach some students about cracking WEP and WPA passwords, as I don't have a real wireless router to use, is there any VM that I could use to simulate a wireless network? Like a Virtual Wireless Router? I tried to use airbase-ng on my Kali…
Ricardo Reimao
  • 732
  • 4
  • 9
5
votes
6 answers

Can one steal data using electric wire?

If I would like to keep my work secret in my computer and I don't use Internet, is it possible for a cracker to steal my data via electric wires or a wireless connection?
layman
  • 77
  • 1
  • 3
4
votes
2 answers

Achieving 'frequency separation' in wireless networks

A popular recommendation from security providers is to ensure wireless networks achieve 'frequency separation' from other wireless networks. What does 'frequency separation' mean in technical terms and what steps could an organisation take to…
KimberleyK
  • 459
  • 1
  • 6
  • 12
4
votes
3 answers

Does an insecure computer on my home wireless network threaten other machines?

I have a DD-WRT based wireless network with strong password security. However, other machines on the network may not be as protected as mine. If these machines are compromised, need I fear the attacker can more easily hack my machine, having…
L Fischman
  • 41
  • 1
4
votes
2 answers

Can wireless (wifi, blutooth..) be attacked even when not connected?

For example, my computer displays a list of wifi network in range, even it doesn't connect to any of them. I don't know wifi protocol so I don't know whether my computer must actively send information out, e.g. handshake, ack..., in order to get the…
user2174870
  • 1,388
  • 2
  • 11
  • 13
4
votes
1 answer

Intercepting video in real time with arp spoofing

Is it possible to intercept video for example a netflix stream in real time if you are connected to the same LAN? Is it possible to know when the target computer pauses and plays the video so you know so you know what's on their screen at any moment…
Bob Ogden
  • 359
  • 3
  • 9
3
votes
2 answers

Are there any extra security risks with leaving wireless enabled while ethernet is connected?

Mainly I'm wondering if operating systems will always use ethernet for internet connections if it is available, falling back to wireless when it is not. My thinking is based around the security threat of someone snooping on a wireless connection,…
Dolan Antenucci
  • 1,143
  • 2
  • 7
  • 5
3
votes
1 answer

What are the countermeasures against key cloning?

I’ve looked into the techniques of cloning the 315Mhz and 433Mhz remote car keys and I’m wondering what’s the countermeasure one can provide against wireless radio key lock? Since the radio signals do not seem to be unique and to have any sort of…
Vilius Povilaika
  • 992
  • 8
  • 22
1
2 3