Active Exploitation Flashcards
(8 cards)
802.11 denial-of-service (DoS) attack that targets the communication link between a client and it’s AP;
risk is that an 802.11 device that is associated with an AP will be notified when it is disconnected from a network
Deauthentication Attack
Continuous DoS attempt;
Attempt to make a device disconnect from your network, and associate with a ROGUE AP;
Capture SSID + WPA2 handshake data;
Make a windows client flush its ARP cache and send an ARP request
Deauthentication Attack
Force my target to create a new initialization vectors (IV);
waits and listens for an ARP packets, obtains the packet, & transmits the package back over and over again
Forcing you to create a new ID
ARP Request Replay Attack
Uses TKIP (Temporal Key Integrity Protocol);
method dynamically changes its keys as it’s being used
WPA2 is widely used today
WPA
“pre-shared key”;
Every user gets the same 256-bit key to authenticate;
Longer, more complex password is recommended
WPA-PSK
No shared key/TKIP/Each user gets a different authentication method;
Used in larger orgs
WPA/Enterprise
Attacker waits for the 4 way handshake then tricks client into using an already known encryption key
KRACK key reinstallation attack
designed to simplify the process of connecting to a network;
Most APs will have a button for this and security;
PIN can be used, but highly vulnerable to brute force attacks using the PIN method to connect;
Can be disabled
WPS