Hacking Wireless networks Flashcards
(78 cards)
1
Q
Wireless technologies
A
-
2
Q
Types of wireless networks
A
A
3
Q
IEEE 802.11 standard
A
A
4
Q
Types of wireless encryption
A
A
5
Q
Ssid
A
A
6
Q
Name and explain Wi-Fi authentication zones
A
A
7
Q
What is a RADRUS service
A
A
8
Q
Types of wireless antenna
A
A
9
Q
What is WEP encryption
A
A
10
Q
How many bits initialisation vector is there for WEP
A
A
11
Q
With Chiper is used in WEP
A
A
12
Q
Which checksum is used for WEP
A
A
13
Q
What is WPA encryption
A
A
14
Q
Which protocol is used in WPA
A
A
15
Q
How does WPA using TKIP eliminate the weaknesses of WEP
A
A
16
Q
What is TSC
A
A
17
Q
What’s is MSDU
A
A
18
Q
Which checksum is used in WPA
A
A
19
Q
Temporal key installation flow
A
A
20
Q
What is WPA2 and how does it work?
A
A
21
Q
Table for WEP VS WPA VS WPA2
A
A
22
Q
What is KSA
A
A
23
Q
What are Initialisation vectors
A
A
24
Q
List down wireless threats
A
A
25
Access control attacks
A
26
Integrity attacks
A
27
Confidentiality attacks
A
28
Availability attacks
A
29
Authentication attacks
A
30
Rouge access point attack
A
31
Client Mis-Association attack
A
32
Mis-configured AccessPoint attack
A
33
Unauthorised Association Association
A
34
Ad Hoc Connection attack
A
35
Honeypot access point attack
A
36
AP Mac spoofing
A
37
Dos attack
A
38
Important Key Reinstallation attack
A
39
Jamming signal attack
A
40
Wireless hacking methodology
A
41
Footprint the wireless network
A
42
Find Wi-Fi networks in the range to attack Wi-Fi chalking techniques
A
43
WiFi discovery tools
A
44
Mobile WiFi discovery tools
A
45
WiFi hotspot finder tools
A
46
Wardriving
A
47
What is the Wi-Fi traffic analysis
A
48
Wi-Fi USB dongle AirPcap
A
49
Name WiFi 4 Packet Sniffer tools
A
50
Aircrack-ng tell me all the subtools
A
51
Command to reveal hidden SSIDs
A
52
Wireless Fragmentation Attack
A
53
How to Launch MAC Spoofing attack
A
54
Dos
Disassociation and deAuthentication Attacks
55
MITM
A
56
Command for MiTm
A
57
Wireless ARP poisoning
A
58
Rogue Access Points
A
59
Important: Evil Twin
A
60
How to setup fake hotspot
A
61
How to break WEP encryption
A
62
Command to crack WEP
A
63
How to break WPA and WPA2 Encryption
A
64
Command to crack WPA PSK
A
65
WPA cracking tools
A
66
WiFi sniffer took
A
67
Bluetooth stack
A
68
Bluetooth Attacks
A
69
Bluetooth threats
A
70
BlueJack
A
71
Wireless Security Layers
A
72
How to defend against WPA and 2 cracking
A
73
How to defend against KRACK
A
74
How to detect rogue AP
A
75
How to defend against wireless attack
A
76
Wireless IPS
A
77
Bluetooth Security Tools
A
78
Wireless Penetration Testing
A