Attacks Flashcards

1
Q

IV attacks

A

A wireless initialization vector (IV) attack attempts to discover the pre-shared key from the IV. The IV is simply a number. Some wireless protocols use an IV by combining it with the pre-shared key to encrypt data-in-transit. An IV attack is successful when an encryption system reuses the same IV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

NFC Attack

A

During an NFC Attack, an attacker uses an NFC reader to capture data from another NFC
device. One method is an eavesdropping attack. The NFC reader uses an antenna to boost its
range, and intercepts the data transfer between two other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluejacking

A

sends information to a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesnarfing

A

takes information from a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Replay Attacks

A

In a replay attack, an attacker captures data sent between two entities, modifies it, and
then attempts to impersonate one of the parties by replaying the data. WPA2 using CCMP and AES is not vulnerable to replay attacks. However, WPA using TKIP is vulnerable to replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPS and WPS Attacks

A

Wi-Fi Protected Setup (WPS) allows users to configure wireless devices without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short eight-digit personal identification number (PIN). For example, a user can configure a new wireless device by pressing a button on the AP
and on the wireless device. It will automatically configure the device within about 30 seconds
with no other actions needed. These buttons can be physical buttons on the devices, or virtual buttons that the user clicks via an application or web page. When using the PIN method, users first identify the eight-digit PIN on the AP and then enter the PIN on the new wireless device. Unfortunately, WPS is susceptible to brute force attacks. A WPS attack keeps trying different PINs until it succeeds. As an example, Reaver is an open source tool freely available that allows
attackers to discover the PIN within 10 hours, and often much quicker. Once it discovers the PIN, it can then discover the passphrase in both WPA and WPA2 wireless networks.
Security experts recommend disabling WPS on all devices. This is typically possible via the
AP configuration page. Even if you choose to enable WPS to easily connect some devices, you should immediately turn it off once you’re done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

VM Escape

A

VM escape is an attack that allows an attacker to access the host system from within the
virtual system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spimming

A

Spim is a type is spam targeting users of instant message (IM) services SMS or private message within websites and social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

pass the hash

A

A password attack that captures and uses the hash of a password. It attempts to log on as the user with the hash and is commonly associated with the Microsoft NTLM protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MAC spoofing

A

An attack that changes the source MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

replay Attack

A

An attack where the data is captured and replayed. Attackers typically modify data before replying it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

replay Attack

A

An attack where the data is captured and replayed. Attackers typically modify data before replying it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly