1.4 Analyze potential indicators associated with network attacks Flashcards
(42 cards)
Used to detect the presence of a wireless network.
Wireless scanner/cracker
An attack in which a hacker operates a false access point that will automatically clone, or twin, the identity of an access point based on a client device’s request to connect.
Evil twin attack
May be planted by an employee for convenience, or it may be operated externally by an attacker.
Rogue access point
The unauthorized accessing of data via a Bluetooth connection.
Bluesnarfing
Grants an attacker remote control over the hardware and software of your devices over a Bluetooth connection.
Bluebugging
The sending of unsolicited messages to Bluetooth capable devices without the permission of the owner/user.
Bluejacking
Eavesdropping or packet capturing Bluetooth communications.
Bluesniffing
A DoS attack against a Bluetooth device.
Bluesmacking
A type of wireless management frame that can be used in wireless attacks, including discovering hidden SSIDs, causing a DoS, hijacking sessions, and on-path.
Disassociation
The transmission of radio signals to prevent reliable communications by decreasing the effective signal-to-noise ratio.
Jamming
A tracking technology based on the ability to power a radio transmitter using current generated in an antenna when placed in a magnetic field.
Radio frequency identification
A standard to establish radio communications between devices in close proximity. It is commonly employed for contactless payments.
Near field communication (NFC)
A mathematical and cryptographic term for a random number.
Initialization vector (IV)
A communications eavesdropping attack. Attackers position themselves in the communication stream between a client and server.
On-path attack
When the malware is operating on the victim’s system.
Browser on-path attack
A form of attack in which malicious content is submitted to a vulnerable application, typically a web browser or web server, under the guise of a valid HTML/HTTP header value.
(
HTTP Header manipulation
The act of falsifying the IP-to-MAC address resolution system employed by TCP/IP.
ARP poisoning
Uses a flooding attack to compromise a switch so that the switch gets stuck into flooding all network communications.
MAC flooding
Used to impersonate another system, often a valid or authorized network device to bypass port security or MAC filtering limitation.
MAC cloning/spoofing
The falsification of the source address of network packets. As a result, victims are unable to locate the true attackers or initiators of a communication. Also, the attacker may use this against the source address to redirect packet responses, replies, and echoes to some other system.
IP spoofing
the hierarchical naming scheme used in both public and private networks. This links human-friendly fully qualified domain names (FQDNs) and IP addresses together.
Domain name system (DNS)
The malicious action of changing the registration of a domain name without the authorization of the valid owner.
Domain hijacking
The act of falsifying the DNS information used by a client to reach a desired system.
DNS poisoning
Is a means to make a web page available through multiple URL addresses or domain names a.k.a. URL forwarding.
URL redirection