Wireless Network Hacking Flashcards

1
Q

What vulnerability exists in WPS (Wi-Fi Protected Setup)?

A

Brute-force, with 11,000 tries or less by providing first 4 numbers instead of the 8.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Fragmentation Attack in Wireless Hacking?

A

Used to help crack the WEP password by obtaining the pseudorandom generation algorithm (PRGA) of captured packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Karma Attack?

A

It is a variant of the evil twin attack. It exploits a device’s Wifi behaviour by connecting to a SSID that was used to connect to in the past. This attack replicates the SSID with a malicious AP instead.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Downgrade Attack?

A

A downgrade attack is an attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version, typically in SSL/TLS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Deauthentication attack?

A

Kicking the victim off from the current connected AP. This is done by spoofing the victim’s MAC address and sending the deauthentication frame to the AP. The victim will automatically try reconnecting. Deauthentication attack can be repeated to prevent the victim from establishing stable connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does WEP Stand for?

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the bit size for the IV (Initialization Vector) in WEP?

A

24 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 possible key lengths for WEP?

A

40/104 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What encryption does WEP use?

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What redundancy check is used in WEP?

A

CRC-32

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does TKIP stand for?

A

Temporal Key Integrity Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does WPA stand for?

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What encryption does WPA use?

A

RC4 + TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the IV bit size for WPA networks?

A

48 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key length for WPA networks?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How often does WPA key changes?

A

Every 10,000 packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What encryption does WPA2 use?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of authentication does WPA2 - Personal use?

A

Pre-Shared Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What type of authentication does WPA2 - Enterprise use?

A

Set of credentials (Either via EAP or RADIUS server)

20
Q

What is the purpose of the 802.11 Series?

A

Defines the standard for wireless networks

21
Q

What technology uses the following standard:

802.15.1

A

Bluetooth

22
Q

What technology uses the following standard:

802.15.4

A

Zigbee - Low power, Low data rate, close proximity networks

23
Q

What technology uses the following standard:

802.16

A

WiMAX - Broadband wireless metropolitan area networks (MAN)

24
Q

What is Basic Service Set Identifier (BSSID)?

A

MAC address of the wireless access point

25
Q

Wireless Attack: Data Frame Injection

What is it?

A

Constructing and sending forced network frames (Data).

26
Q

Wireless Attack: Bit-Flipping

What is it?

A

Capturing frames and flipping bits within the data payload.

27
Q

What is the purpose of warwalking, wardriving and warflying?

A

To discovery WiFi networks and access points, often looking for insecure ones to hack or gain access to.

28
Q

What type of tool is Kismet?

A

Wireless packet analyser/sniffer. Also can be used for network discovery.

29
Q

Wireless Attack: Rogue Access Point

What is it?

A

Placed Access Point controlled by an attacker.

30
Q

Wireless Attack: Evil Twin

What is it?

A

Rogue AP with similar SSID to the target network. AKA Mis-association attack.

31
Q

Wireless Attack: Honeyspot

What is it?

A

Faking a well-known hotspot with a Rogue AP

32
Q

Wireless Attack: Ad-Hoc Connection Attack

What is it?

A

Connecting directly to another phone via wireless media. Victim has to accept the connection

33
Q

Wireless Attack: Deauthentication

What is it?

A

Send a deauth packet to the AP with spoofed victim MAC address, disconnecting them from the network.

34
Q

Wireless Attack: MAC Filtering

What is it?

A

Retrieving (Sniffing) authorised MAC addresses to connect to the network

35
Q

Are the following tools used for?

SMAC and TMAC

A

MAC spoofing

36
Q

List 2 main attacks against WPA/WPA2 networks

A
  1. Password Brute-force
  2. Key Reinstallation Attack (KRACK)
37
Q

What does AAA stand for?

A
  1. Authentication
  2. Authorisation
  3. Accounting
38
Q

Which network protocols has AAA functionality?

A
  1. TACACS+
  2. RADIUS
  3. Diameter
39
Q

What is a Rogue Access Point?

A

A Wireless Access Point (WAP) added by a well-meaning employee or by a malicious attacker.

40
Q

What is 802.1x protocol?

A

Provides authentication mechanism for both wireless and wired connections.

41
Q

What is a Packet/Network sniffer?

A

Hardware or software tool to monitor data in a network

42
Q

What is a Protocol Analyser?

A

Hardware or software tool to monitor and perform analysis on data in a network

43
Q

What tool can be used for computer network protocol analysis and security auditing?

A

Ettercap

44
Q

Wireless intrusion prevention system (WIPS) operates at what layer of the Open Systems Interconnection (OSI) model?

A

Layer 2 - Data Link

45
Q

What is Tcptrace used for?

A

Analyze the files produced by packet-capture programs such as tcpdump, WinDump, Wireshark, and EtherPeek

46
Q

What type of tool is NetStumbler?

A

Application is a Windows-based tool generally used to discover WLAN networks running on 802.11 a/b/g standards and used to collect wireless packet data