ELI5: What are Wireless Attacks?

Wi-Fi is like an invisible conversation happening through the air between your device and a router. Since it’s traveling through open air instead of a wire, anyone nearby can try to listen in or interfere. Wireless attacks are when someone sets up a fake Wi-Fi network that looks real (like a fake lemonade stand), jams the signal so you can’t connect, or eavesdrops on what you’re sending. It’s like someone with a walkie-talkie tuned to your channel, hearing everything you say.

Overview

Wireless attacks exploit the inherent vulnerability of data transmitted over radio frequencies — anyone within range can potentially intercept or interfere with wireless communications. Wi-Fi, Bluetooth, NFC, and RFID each present unique attack surfaces. The Security+ exam tests knowledge of wireless attack techniques and the protocols and configurations that defend against them.

Key Concepts

  • Evil twin: Rogue access point that mimics a legitimate network’s SSID to trick users into connecting
  • Rogue access point: Unauthorized AP connected to the corporate network, creating a backdoor past perimeter security
  • Deauthentication attack: Sending forged 802.11 deauth frames to disconnect clients, often preceding an evil twin or handshake capture
  • WPA2 handshake capture: Capturing the 4-way handshake to perform offline brute-force password cracking
  • WPS attacks: Exploiting Wi-Fi Protected Setup PIN vulnerability to recover the WPA key
  • KRACK (Key Reinstallation Attack): Exploiting a flaw in WPA2’s 4-way handshake to decrypt traffic
  • Bluetooth attacks: Bluejacking (unsolicited messages), Bluesnarfing (data theft), Bluebugging (full device control)
  • RFID cloning: Copying RFID badge data to create unauthorized duplicate access cards
  • NFC attacks: Eavesdropping on or manipulating Near Field Communication transactions
  • Jamming: Flooding the wireless spectrum with noise to prevent legitimate communication (DoS)
  • War driving: Scanning for wireless networks while moving through an area to map vulnerable APs

Exam Tips

Remember

WPA3 fixes KRACK and adds SAE (Simultaneous Authentication of Equals) replacing PSK. Evil twin = fake AP, rogue AP = unauthorized AP on network. Always disable WPS. Use WPA3-Enterprise with 802.1X for maximum security.

  • WEP is completely broken — never use it. WPA2-Enterprise with AES is minimum acceptable
  • Deauth attacks work because management frames in 802.11 are not authenticated (fixed in 802.11w/WPA3)
  • Bluetooth: disable when not in use, set to non-discoverable mode

Connections

  • Evil twin and deauth attacks are specific types of network-attacks in the wireless domain
  • Wireless interception enables on-path-attacks between the victim and the access point
  • Rogue APs and evil twins bypass controls that network-monitoring should detect through wireless IDS
  • Wireless vulnerabilities are a category covered under vulnerability-types

Practice Questions

Scenario

See case-wireless-attacks for a practical DevOps scenario applying these concepts.