![]() See the MAC addresses of devices communicating of the network.See the existence of the wireless access point (AP) and any hosts communicating with it.Baseline: As a baseline, any attacker can sniff data link layer frames, and as such can:. ![]() In a wireless (WiFi) setting frame contents are encrypted/authenticated with wireless protected access (WPA) or related security protocols.Ĭonsider a scenario in which someone in a car outside your house or business is trying to eavesdrop on your wireless network traffic. Unencrypted over HTTP.įrame header including MAC address, frame contents including higher layer data.įrame contents exposed in a wired LAN but physically isolated across network segments by switches/routers. Packet contents encrypted/authenticated with transport layer security (TLS) if communicating over HTTPS. IP header including IP address, IP packet contents including higher layer data HTTP request methods (e.g., GET/POST) including the URL of sites visited. For the sake of our discussion on security, however, the 4-layer Internet Protocol suite model is a good starting point: LayerĪpplication data including session cookies, document content (HTML, images, etc) Open Systems Interconnection (OSI) model of network communication. Hacking Wifi and Man-in-the-Middle attacks OSI Model Review
0 Comments
Leave a Reply. |