Network-Based Attack Surfaces (Domain 2)

In this episode, we are examining network-based attack surfaces. These include unsecure wireless networks, physically accessible wired connections, and Bluetooth-enabled devices. Each of these introduces opportunities for attackers to intercept traffic, inject malicious content, or bypass authentication. By understanding these surfaces and the methods used to exploit them, you can build stronger defenses and reduce the risk of compromise.
Let’s begin with unsecure wireless networks. Wireless networks are convenient and flexible, but they also introduce unique security challenges. Because radio signals travel through the air, attackers do not need physical access to a building to target wireless systems. They only need to be within range of the signal. This makes wireless networks a high-value attack surface—especially when security is poorly configured or out of date.
One common wireless threat is the rogue access point. This is a wireless access point installed without authorization or security controls. It might be set up by an employee who wants better signal strength or planted by an attacker trying to lure users into connecting. Once connected, traffic can be intercepted, monitored, or redirected to malicious sites.
Another threat is Wi-Fi spoofing. In this scenario, an attacker sets up a fake access point using the same name as a legitimate one—often in public places like airports or coffee shops. When users connect to the spoofed network, their data can be captured or their devices infected with malware.
To defend against wireless threats, organizations should implement modern security protocols such as Wi-Fi Protected Access version three. This standard provides stronger encryption and authentication mechanisms than earlier versions. Secure authentication using methods like certificate-based login or remote authentication with centralized directories also reduces the chance of unauthorized access.
Access points should be centrally managed, monitored, and restricted to authorized devices. Wireless intrusion detection systems can alert administrators to rogue access points or suspicious activity. Users should be taught to avoid connecting to unknown networks and to use virtual private networks when working on public Wi-Fi.
Next, let’s talk about wired networks and physical access risks. While wired connections are generally more secure than wireless ones, they are not immune to attack—especially when physical access is available. If an attacker can reach a physical network port, they may be able to plug in a device and capture traffic or gain unauthorized access to internal systems.
Network tapping and packet sniffing are two methods used in wired environments. Network tapping involves placing a device on the cable or switch to collect all data that passes through. Packet sniffing tools then analyze that data, looking for unencrypted passwords, confidential files, or other sensitive information.
In environments without proper segmentation or port-level security, attackers can use these techniques to move laterally across the network, access unsecured systems, or exfiltrate data without detection.
The best way to protect against these threats is through layered physical and network controls. Physical security measures like locked server rooms, secure switch cabinets, and restricted cable access are the first line of defense. Port security features on switches can be configured to limit which devices can connect to each port based on hardware address. Unused ports should be disabled entirely.
Network segmentation also helps by limiting how far an attacker can travel once access is gained. Sensitive systems should be placed on separate subnets with strict access controls. Traffic monitoring and alerting tools can identify unusual patterns and help spot intrusions in progress.
Finally, let’s examine Bluetooth vulnerabilities. Bluetooth technology is used to connect devices like wireless headsets, keyboards, fitness trackers, and smartphones. While it is designed to be convenient, Bluetooth can also be exploited if not properly secured.
Two well-known Bluetooth-based attacks are Bluejacking and Bluesnarfing. Bluejacking involves sending unsolicited messages to nearby Bluetooth-enabled devices. This is more of a nuisance than a serious threat, but it can still be used to disrupt users or trick them into clicking malicious links.
Bluesnarfing is more serious. It involves unauthorized access to data on a Bluetooth-enabled device, such as contact lists, messages, or stored files. This attack usually requires the device to be discoverable and poorly configured, but once exploited, it can lead to significant privacy and data breaches.
Bluetooth attacks are particularly dangerous because users often leave devices in discoverable mode or accept pairing requests without verifying the source. In public places, this creates an opportunity for nearby attackers to connect or intercept communications.
To reduce Bluetooth-related risk, users should disable Bluetooth when not in use, avoid pairing with unknown devices, and turn off discoverable mode by default. Devices should be configured to require strong authentication during pairing, and firmware updates should be applied regularly to patch known vulnerabilities.
As you prepare for the Security Plus exam, make sure you understand the unique risks associated with wireless, wired, and Bluetooth-based attack surfaces. Wireless threats often come from rogue access points and spoofing. Wired threats involve physical access and traffic capture. Bluetooth threats rely on weak pairing processes or discoverable devices. The exam may give you a scenario involving suspicious network activity or unauthorized access, and your task will be to identify the likely attack surface and recommend appropriate defenses.

Network-Based Attack Surfaces (Domain 2)
Broadcast by