GCGA Ch. 4 Understanding Wireless Attacks (ST) Flashcards
(8 cards)
Disassociation attack
effectively removes a wireless client from a wireless network, forcing the wireless client to reauthenticate.
WPS
Wi-Fi Protected Setup - allows users to easily configure a wireless device by pressing a button or entering a short PIN. WPS is not secure with WPA2. A WPS attack can discover the PIN within hours. It then uses the PIN to discover the passphrase. However, WPA3 thwarts WPS attacks.
Rogue AP
A rogue access point (rogue AP) is an AP placed within a network without official authorization. An evil twin is a rogue access point with the same or similar SSID as a legitimate access point.
Jamming attack
floods a wireless frequency with noise, blocking wireless traffic.
IV attacks & NFC attacks
An initialization vector (IV) attack attempts to discover the IV and uses it to discover the passphrase. Near field communication (NFC) attacks use an NFC reader to read data from mobile devices.
RFID attack
Radio-frequency identification (RFID) attacks include eavesdropping, replay, and DoS. Attackers exploit vulnerabilities in these systems to gain unauthorized access to information, clone access cards, or disrupt operations.
Bluejacking & bluesnarfing
bluejacking is the practice of sending unsolicited messages to a phone. Bluesnarfing is the unauthorized access to or theft of information from a Bluetooth device. Placing devices into conductive metal lockboxes that act as a Faraday cage will block Bluetooth attacks.
Wireless replay attack
an attacker captures data sent between two entities, modifies it, and then impersonates one of the parties by replaying the data. WPA2 and WPA3 are resistant to wireless replay attacks.