day 3 Flashcards

1
Q

important parts of an 802.11 frame

A

..

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

address 1-4

A

1 MAC: Acknowledgement (destination)
2 MAC: Rare
3 MAC: Source MAC, Destination MAC, BSSID **most common!!!!!!
4 MAC: sending bridge, receiving bridge, source MAC, destination MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

frame body

A

the maximum amount of data in a legacy 802.11 frame is 2304 bytes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

802.11 frame types

A

….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

management frames

A

connect and disconnect from a network

all management and control frames are sent in plaintext, even in a network protected by encryption.

ie. beacon frame (management frame)
probe response frame (contains client and AP MAC’s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

802.11w

A

ratified to increase the security of management frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

control frames

A

help deliver data frames

i.e. acknowledgement (ACK) frame–type of control frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

data frames

A

can be encrypted (the only type of the 3 frames)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

wireless CO methodology

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

cyberspace ISR

A

focuses on tactical/operational intelligence and mapping adversary cyberspace to support military planning.

Made up of intel gathering and analysis/reporting
most time consuming!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

survey

A

the focus of surveys is to get as much information about every available wireless network as possible.
(gather intel about networks)
use omnidirectional antennas.
the focus is on management frames (beacons)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

collection

A

the goal of collection is to record specific intelligence from targets.
(gather intel on specific target using semidirectional antenna)
use of appropriate directional antennas and amplifiers increases the minimum distance needed from a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a good fixed collection site has these three attributes:

A
  • strong receive signal
  • stealth
  • safety
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

analysis and reporting…

at a minimum, analysts should ask themselves:

A
  • what do i know
  • what else do i need to know
  • who do i tell
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

target nomination and intel gain/loss assessment

A

phase where a decision will be made to perform cyberspace OPE or OCO against a target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

cyberspace OPE

A

this could be a variety of active exploitation efforts in the adversary’s network and devices to gain footholds, weaken defenses, and/or implant tools

17
Q

offensive cyberspace operations

A

OCO are CO intended to project power by the application of force in and through cyberspace. OCO will be authorized like offensive operations in the physical domains, via an execute order (EXORD)

OCO=EXORD!!!!

18
Q

wireless cyberspace attacks

A

within the IC, attacks that do not degrade the target’s ability to use the WLAN are commonly referred to as CNE. Attacks that degrade, disrupt, or destroy are referred to as CNA

19
Q

CNE

A

active and passive operations to gain access to target information systems

20
Q

ARP cache poisoning

A

this technique is used to insert a wireless attacker between two wired devices on the same layer 3 network supported by an AP
(attacker must be on the network!)

21
Q

DNS spoofing

A

an attack that returns an incorrect IP address to a client who submitted a DNS query.

22
Q

these exploitations provide unauthorized access to a network by bypassing the captive portal restrictions

A
  • MAC address spoofing
  • IP address spoofing
  • covert tunneling
23
Q

CTS attack

A

an attacker can DOS every station within its RF range by sending out spoofed CTS frames or prompt an AP to send the CTS frame by sending repeated RTS frames.

This AFFECTS ALL DEVICES operating on a specific channel, even those on different networks

most effective against an entire network!!!

24
Q

deauthentication attack

A

best to use against a single device

25
Q

heat maps

A

a heat map is a software-generated picture that correlates the signal strength of emitters at each GPS location

26
Q

direction finding (DF)

A

equipment identifes the direction from which it is receiving the most RF energy (i.e. highest signal strength) from a given signal on a particular frequency.

taking multiple LOB’s from different directions - called triangulating - reduces the uncertainty of an emitter

reflection, scattering, diffraction, and refraction may cause DF equipment to think an emitter is in a different location

27
Q

geolocation

A

often needs hundreds or thousands of measurements.

geolocation tends to be more accurate than DF systems