What Is Phlooding ?

This post has been viewed 39317 times since Wednesday 15 November 2006 @ 3:04 am

We have heard about phishing, but have you heard about phlooding?

According to AirMagnet Inc, one of the leaders in wireless LAN (WLAN) security and performance solutions, phlooding is a new exploit describes a group of simultaneous but geographically distributed attacks that targets a business’s authentication or network log-in structure, with the goal of overloading its central authentication server.

Quoted:
In a phlooding attack, several attackers in different locations bombard wireless access points (APs) with login requests using multiple password combinations in what are known as “dictionary” attacks. This creates a “flood” of authentication requests to the company’s central authentication server, which could slow down logins and potentially interfere with broader network operations, since many different users and applications often validate themselves against the same identity management server for email access, database applications, and other corporate uses. Phlooding could effectively block broadband VPN or firewall connections that use a common authentication server to verify an incoming user’s identity, making it temporarily impossible for employees to access their corporate network.


Blogsphere: TechnoratiFeedsterBloglines
Bookmark: Del.icio.usSpurlFurlSimpyBlinkDigg
RSS feed for comments on this post
 |  TrackBack URI for this post








Powered by Disqus

Apple iPad & Maxis WiFi Modem Reviews «
Apple iPad & Maxis WiFi Modem Reviews
Nokia N8 Reviews «
Nokia N8 Reviews
Samsung Galaxy S Reviews «
Samsung Galaxy S Reviews
Nokia N900 Reviews «
Nokia N900 Reviews
Nokia N97 Reviews «
Nokia N97 Reviews



.................................

Live Stats

Recent Posts

Recent Comments

Recent Trackbacks

Favorite Icon



My QR Code A List Blogger