GCGA Ch. 4 Understanding Wireless Attacks (ST) Flashcards

(8 cards)

1
Q

Disassociation attack

A

effectively removes a wireless client from a wireless network, forcing the wireless client to reauthenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPS

A

Wi-Fi Protected Setup - allows users to easily configure a wireless device by pressing a button or entering a short PIN. WPS is not secure with WPA2. A WPS attack can discover the PIN within hours. It then uses the PIN to discover the passphrase. However, WPA3 thwarts WPS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rogue AP

A

A rogue access point (rogue AP) is an AP placed within a network without official authorization. An evil twin is a rogue access point with the same or similar SSID as a legitimate access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jamming attack

A

floods a wireless frequency with noise, blocking wireless traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IV attacks & NFC attacks

A

An initialization vector (IV) attack attempts to discover the IV and uses it to discover the passphrase. Near field communication (NFC) attacks use an NFC reader to read data from mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RFID attack

A

Radio-frequency identification (RFID) attacks include eavesdropping, replay, and DoS. Attackers exploit vulnerabilities in these systems to gain unauthorized access to information, clone access cards, or disrupt operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bluejacking & bluesnarfing

A

bluejacking is the practice of sending unsolicited messages to a phone. Bluesnarfing is the unauthorized access to or theft of information from a Bluetooth device. Placing devices into conductive metal lockboxes that act as a Faraday cage will block Bluetooth attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless replay attack

A

an attacker captures data sent between two entities, modifies it, and then impersonates one of the parties by replaying the data. WPA2 and WPA3 are resistant to wireless replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly