Cyber Security: Network Attacks
Hi everyone, welcome back. Cyber security is an important area of focus. There is a whole lot of data that is being stored digitally, and this includes sensitive data that could potentially cause damage to someone or even a whole company. We will go over some network attack methods and strategies that hackers might use so you can be aware of them.

Bluejacking
Bluejacking occurs when unauthorized messages or data is sent through Bluetooth technology to a victim’s device. Typically sends a vCard that contains a message in the name field to another Bluetooth device via the OBjectEXchange(OBEX) protocol.
Bluesnarfing
Bluesnarfing occurs when an attacker gains unauthorized access to data on a victims device via Bluetooth connection. Data pulled off could include contacts, pictures, and messages. More sensitive information such as emails and personally identifiable information(PII) can also be stolen through bluesnarfing.
Rogue Access Points
Rogue access points are unauthorized points that were installed without the network owners permission or knowledge. This can be installed for attackers to perform jamming, interference, or man in the middle type of attacks. Rogue access points can also be used to steal and intercept data.
Dissociation
Dissociation attacks occurs when a wireless connection between a victim and access point is broken. This is a form of Denial of Service(DoS) type of attack. Dissociation attacks are capable of disconnecting a user/victim from their router and will not let the user/victim connect to the WiFi.
Jamming
Jamming is another Denial of Service(DoS) type of attack. It occurs when excessive interference is sent into a network, causing its network channels to become unusable.
Initialization Vector(IV) Attack
IV attacks occur when the IV of packets are modified during transmission. Attackers are capable of seeing the IVs being sent and using the IV to decrypt and gain access to data within packets.
Man-In-The-Middle
A type of attack that occurs when an attacker secretly propagates and possibly modifies data that is transmitted between two users. Man-in-the-middle (MITM) attacks can be used to plant malware and intercept data. MITM attacks can be used for eavesdropping purposes as the two users are unaware of the “middle man” when all communications are being intercepted by an attacker.
ARP Poisoning
ARP poisoning occurs when an attacker sends out spoofed messages onto a LAN to associate a machine to a default gateway in order to pair its IP and MAC address. This allows attackers to gain access to data that is intended for a different recipient. This can also be used for Denial of Service(DoS), Man-In-The-Middle(MITM), and session hijacking attacks.
Conclusion
These are just some of the many types of attacks to be aware of. There are a whole lot more of different cyber attacks that can come in all sorts of forms, but hopefully this is enough to raise awareness. To read more about network attacks, click here. I hope this helps. Thanks for reading.