Network and Wireless Attacks

Key Takeaways

  • Network attacks often target traffic redirection, name resolution, availability, or trust boundaries.
  • On-path attacks intercept or alter traffic between parties; spoofing impersonates a trusted address, system, or identity.
  • DoS and DDoS attacks exhaust capacity, state tables, application resources, or upstream bandwidth.
  • Wireless attacks include evil twin, rogue access point, deauthentication, jamming, and weak protocol abuse.
  • Mitigations include segmentation, secure protocols, DNS protections, switch security, WPA3 or 802.1X, monitoring, and DDoS controls.
Last updated: April 2026

Network and Wireless Attacks

Network attack questions ask what trust assumption failed. Did the attacker redirect traffic, impersonate a system, flood a service, weaken wireless access, or trick name resolution?

AttackWhat happensTypical clueMitigation
On-path attackAttacker intercepts traffic between partiesCertificate warning, altered trafficTLS validation, VPN, secure switching
ARP poisoningAttacker maps their MAC to another IPGateway MAC changes, local LAN issueDynamic ARP inspection, static entries for critical systems
DNS poisoningName resolves to malicious addressCorrect URL, wrong destinationDNSSEC, secure resolvers, cache clearing
IP/MAC spoofingAttacker forges address identityTraffic from impossible or duplicate addressACLs, DHCP snooping, switch port security
DoS/DDoSService is exhausted or unreachableTraffic flood, high resource useRate limiting, CDN/scrubbing, autoscaling, filtering
Replay attackCaptured data is reusedDuplicate valid request or tokenNonces, timestamps, session protection
SSL strippingHTTPS downgraded to HTTPUser sees HTTP for sensitive siteHSTS, user awareness, secure cookies
VLAN hoppingAttacker reaches another VLANUnexpected cross-VLAN trafficDisable trunking on access ports, native VLAN hardening

Wireless Attack Map

Wireless attackDescriptionDefensive clue
Evil twinFake AP mimics a legitimate networkUse 802.1X certificates and user verification
Rogue APUnauthorized AP connected to the networkWireless scanning and NAC
DeauthenticationForces clients off Wi-FiWPA3/management frame protection where supported
JammingRadio interference disrupts serviceSpectrum analysis, channel planning, physical response
BluejackingUnwanted Bluetooth messagesDisable discovery, user awareness
BluesnarfingUnauthorized Bluetooth data accessPatch devices, disable unused Bluetooth
WPS PIN attackWeak WPS enrollment abusedDisable WPS

Worked Example: Name Resolution

A user enters the correct banking URL but reaches a convincing fake site. The certificate is invalid, and DNS cache shows the banking domain resolving to an unfamiliar IP. That points to DNS poisoning or local host file tampering, not a password attack by itself. The right response is to remove the poisoned entry, check resolver integrity, validate endpoint compromise, and ensure DNSSEC or trusted resolver controls where applicable.

Worked Example: DDoS Triage

SymptomMore likely layerResponse
Upstream link saturatedVolumetricProvider scrubbing or CDN
Firewall state table fullProtocol/state exhaustionRate limits, SYN protections, upstream filtering
Web CPU spikes from expensive search requestsApplication layerWAF rules, caching, rate limits

The best DDoS mitigation depends on where resources are exhausted. A local firewall cannot help if the circuit is already saturated before traffic reaches it.

Common Traps

TrapBetter exam reasoning
"Use encryption" for every network attackEncryption helps confidentiality and integrity, but not all flooding or jamming
Confuse rogue AP and evil twinRogue AP is unauthorized infrastructure; evil twin impersonates a known SSID
Treat jamming as an authentication failureJamming is radio interference and may require spectrum or physical investigation
Place DDoS mitigation behind the bottleneckFiltering must happen before or at the exhausted point

Quick Drill

  1. Users connect to "CorpWiFi" in a cafe and enter credentials into a captive portal: evil twin.
  2. Local clients see the default gateway IP mapped to a new MAC address: ARP poisoning.
  3. A public API receives millions of valid-looking search requests per minute: application-layer DDoS.
  4. Correct hostnames resolve to attacker-controlled addresses: DNS poisoning or resolver compromise.
Test Your Knowledge

Users connect to a fake wireless network with the same SSID as the company network. What attack is this?

A
B
C
D
Test Your Knowledge

A web application is unavailable because the upstream internet circuit is saturated by traffic. Which mitigation is most appropriate?

A
B
C
D
Test Your KnowledgeMulti-Select

Which controls help reduce LAN spoofing and redirection attacks? Select two.

Select all that apply

Dynamic ARP inspection
DHCP snooping
WPS PIN enrollment
Plain HTTP for management