Network Attacks
Wireless networking has loads of security flaws. Here are several possible attacks that hackers can do to exploit your system.
Contents
[hide]Passive Attacks
Passive attacks aim to obtain or view information or data in computer networks without modifying or interfering with anything occuring.
Wiretapping
An attacker can eavesdrop on rednet/modem communications an obtain sensitive information. Unless this information is encrypted, it can easily be read by the attacker, possibly compromising passwords, control signals, or other sensitive info
Mimicry
An attacker can run a server that listens on the same channel or spoofs the ID of a legitamate server, causing users with the client program to send their data to both the legitamate server and the attacker, who now knows the information.
Active Attacks
Active attacks are designed to modify or interupt normal system usage.
Backdoor
Backdoors are essentially tunnels that lead into a computer which must be manually opened by an attacker. A backdoor generally works like this:
- The attacker sends a program on a channel that the backdoor is listening on.
- The backdoor finds the program, downloads it, and executes it.
The program that the backdoor executes can be any form of malicious thing, such as copying or modifying files or programs, setting of redstone signals, or anything else an attacker would like to do. Backdoors are usually difficult to put onto a computer, but they are possible to do.
Identity Spoof
Most web applications use computer ID's to determine if it is authentic or not. An attacker can assume a computer ID to bypass ID-based whitelists easily.
Forgery
An attacker can send his own message to a client incapable of distinguishing the source of a message between the legitamate server or a forger, causing it to think it's a legitamate message. An attacker can also send a forged message to a server, causing it to think it came from the client.