Active Exploitation Flashcards

(8 cards)

1
Q

802.11 denial-of-service (DoS) attack that targets the communication link between a client and it’s AP;
risk is that an 802.11 device that is associated with an AP will be notified when it is disconnected from a network

A

Deauthentication Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Continuous DoS attempt;
Attempt to make a device disconnect from your network, and associate with a ROGUE AP;
Capture SSID + WPA2 handshake data;
Make a windows client flush its ARP cache and send an ARP request

A

Deauthentication Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Force my target to create a new initialization vectors (IV);
waits and listens for an ARP packets, obtains the packet, & transmits the package back over and over again
Forcing you to create a new ID

A

ARP Request Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Uses TKIP (Temporal Key Integrity Protocol);
method dynamically changes its keys as it’s being used

WPA2 is widely used today

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

“pre-shared key”;
Every user gets the same 256-bit key to authenticate;
Longer, more complex password is recommended

A

WPA-PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

No shared key/TKIP/Each user gets a different authentication method;
Used in larger orgs

A

WPA/Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacker waits for the 4 way handshake then tricks client into using an already known encryption key

A

KRACK key reinstallation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

designed to simplify the process of connecting to a network;
Most APs will have a button for this and security;
PIN can be used, but highly vulnerable to brute force attacks using the PIN method to connect;
Can be disabled

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly