New WLAN Attacks Identified

WLAN security vendor AirDefense says monitoring at the DefCon convention revealed a new type of Denial-of-Service attack as well as possible firmware bugs that could leave NICs and access points vulnerable.


You Can't Detect What You Can't See: Illuminating the Entire Kill Chain

On-Demand Webinar

AirDefense of Alpharetta, Georgia, says that during monitoring at the DefCon hacker convention in Las Vegas last weekend the company identified new security issues specifically effecting wireless LANs.

The first is a new Denial-of-Service (DoS) attack that can knock "targeted user stations off the WLAN, forcing stations or access points to shutdown, or disrupting all WLAN connections," said Scott Hrastar, co-founder and CTO of AirDefense, in the company's announcement. This DoS attack includes a "flood" of control frames that will disrupt everything on a given channel. AirDefense has developed a signature for this attack and added it to the AirDefense Guaurd security/monitoring product.

The company is also investigating potential firmware bugs in some access points and wireless network interface cards (NICs) that leave them vulnerable to a forced reboot before the wireless connection is actually established with the network. AirDefense says if specific firmware on products can be identified as having an issue, they'll work with the industry and vendors to get this fixed before announcing any specific products with vulnerabilities.

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.