3.2 Attacks and Exploits Flashcards

Given a scenario, research attack vectors and perform wireless attacks.

1
Q

What is important when eavesdropping communications?

A

When eavesdropping communications by sniffing traffic, it is important to know that it’s more likely possible on public, unencrypted Wi-Fi networks. Although, even on encrypted networks, certain information is transmitted in cleartext, such as a client’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a deauthentication(deauth) attack?

A

This attack will boot the victim(s) from an Access Point(AP) and force them to reauthenticate. A deauth attack is used so the victim generates the required traffic needed for the malicious actor to capture the handshake. Other than a simple DoS, deauth attacks are used during evil twin, replay and cracking attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a jamming attack?

A

Jamming is an attack that disrupts a Wi-Fi signal by broadcasting on the same frequency as the target WAP, and any signals that a wireless transceiver is attempting to send or receive will be blocked. With this attack you can trigger a DoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a WPS PIN attack?

A

In this attack, a malicious actor can gain access to the network by determining the PIN number of the WPS device, using an online or offline brute force attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an Evil Twin?

A

An Evil Twin is a rogue access point that attempts to trick users into believing that it is a legitimate AP, such as an organization’s official Wi-Fi network. Getting users to join an evil twin is often accomplished by using a deauth attack. Once the client is kicked off the network, you may be able to trick them into connecting to the rogue AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Bluejacking?

A

Bluejacking is a method used by attackers to send out unwanted text messages, images or videos to a mobile device using a Bluetooth connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bluesnarfing?

A

Bluesnarfing is an attack, where a malicious actor is trying to read information from a victim’s Bluetooth device. The end goal is to glean sensitive data from the victim, such as contacts, calendars, email messages, text messages etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly