1 00:00:07,080 --> 00:00:07,913 - [Presenter] Let's go over 2 00:00:07,913 --> 00:00:11,500 what are packet injection attacks in wireless networks. 3 00:00:11,500 --> 00:00:13,790 To perform this type of attack, 4 00:00:13,790 --> 00:00:16,229 an attacker must have a deep understanding 5 00:00:16,229 --> 00:00:19,850 and knowledge of the protocol use in the wireless network. 6 00:00:19,850 --> 00:00:23,200 First, you need to perform passive information gathering 7 00:00:23,200 --> 00:00:24,360 of the network 8 00:00:24,360 --> 00:00:28,410 and then create the specific wireless protocol frames 9 00:00:28,410 --> 00:00:31,950 in order to send it to the target network. 10 00:00:31,950 --> 00:00:35,170 There are basically two ways of doing this. 11 00:00:35,170 --> 00:00:38,090 You can either create a false packet 12 00:00:38,090 --> 00:00:40,760 and then inject that packet into that network. 13 00:00:40,760 --> 00:00:43,790 And the other way is actually to sniff the network traffic. 14 00:00:43,790 --> 00:00:46,990 And once the packets are actually sent to the destination 15 00:00:46,990 --> 00:00:49,730 the response from that wireless network 16 00:00:49,730 --> 00:00:53,940 is actually captured then intercepted and then modified 17 00:00:53,940 --> 00:00:56,560 to perform a man-in-the-middle attack. 18 00:00:56,560 --> 00:00:59,690 And don't worry, we will cover man-in-the-middle attacks 19 00:00:59,690 --> 00:01:01,320 in the next lesson. 20 00:01:01,320 --> 00:01:03,930 Now you can detect packet injection, 21 00:01:03,930 --> 00:01:07,000 running a packet analyzer or packet sniffer 22 00:01:07,000 --> 00:01:08,320 on the wireless network, right? 23 00:01:08,320 --> 00:01:11,960 So if point A, so if the source or 24 00:01:11,960 --> 00:01:15,740 specific entity in the network has no record 25 00:01:15,740 --> 00:01:19,330 of actually sending certain packets that show up 26 00:01:20,713 --> 00:01:23,950 in the log at point B or vice versa, right? 27 00:01:23,950 --> 00:01:26,600 Then you can probably assume 28 00:01:26,600 --> 00:01:29,850 that these inconsistencies could lead and show 29 00:01:29,850 --> 00:01:32,320 that those packets have been forged 30 00:01:32,320 --> 00:01:35,080 and have been injected by somebody else, right? 31 00:01:35,080 --> 00:01:37,270 You will learn how to do packet injection attacks 32 00:01:37,270 --> 00:01:39,890 later in this course whenever we actually cover 33 00:01:39,890 --> 00:01:43,710 some of the tools like Aircrack-ng and some others. 34 00:01:43,710 --> 00:01:46,860 You will also learn some caveats about packet injection 35 00:01:46,860 --> 00:01:49,230 with some wireless adapters in lesson three 36 00:01:49,230 --> 00:01:52,953 when we cover the different wireless antennas and adapters.