MOD 5: Passive 802 Exploitation - PE Flashcards

1
Q

[TRUE / FALSE]

Passive 802.11 Exploitation is the ability to exploit information of already-collected signals WITHOUT transmitting any frames into a wireless network.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A target is always aware when passive exploitation is being conducted.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When an intruder is not actively doing anything, just monitoring information to exploit at a later time, this is referred to as what type of passive exploitation?

  • Targeting
  • Keylogging
  • Backlogging
  • Re-logging
A

Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The settings on a(n) _______ can help the client determine what kind of three specific kinds of encryption to use or not to use.

  • Device
  • Router
  • AP
  • None of These
A

Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The three kinds of 802.11 Encryption are:

  • WEP, WPA1, WPA3
  • WEP, WPA, WPA2
  • WPA1, WPA2, WPA3
  • WEP, WEP2, WPA
A

WEP, WPA, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wire Equivalency Privacy (WEP), also known as the original IEEE 802.11 standard of encryption, was originally ratified in what year?

  • 1992
  • 1994
  • 1995
  • 1997
A

1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wired Equivalent Privacy (WEP), was decommissioned in 2004, and succeeded by what??

  • WEP 2.0
  • WEBV2
  • WPA2
  • WPA
A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alongside using the same RC4 stream cipher and CRC-32 checksum, what protocol did WPA use as a solution to WEP shortcomings?

  • Temporal Key Integrity Protocol (TKIP)
  • Temporal Load Key Protocol (TLKP)
  • Temporary Keyed Initial Protocol (TKIP)
  • None of the above. WEP didn’t have any shortcomings.
A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WPA was later succeeded by what?

  • WPA 1.1
  • WPA 3
  • WPA2
  • WEP2
A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

[True / False]

WPA2 defines two types of security: Passphrase Authentication and 802.1X/EAP security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passphrase Authentication is for what kinds of networks?

  • Enterprise Networks
  • Small office/Home office networks (SOHO)
  • Recreational office/Home office networks (ROHO)
  • Commercial Networks
A

Small office/Home office networks (SOHO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1X/EAP security is for what kinds of networks?

  • Commercial Networks
  • Enterprise Networks
  • Small office/Home office networks (SOHO)
  • None of the above
A

Enterprise Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What standard, not protocol, replaced the RC4 Cipher used in WEP and temporal key integrity protocol (TKIP)?

  • Advanced Encryption Standard (AES)
  • Advanced Clear Text Standard (ACTS)
  • Advanced Key Standard (AKS)
  • Advanced Cipher Standard (ACS)
A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool is used for wi-fi hacking and security?

  • Aircrack
  • CCMP
  • Counter-mode
  • AES
A

Aircrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Aircrack is an all-in-one tool that can be used as what?

  • Packet Sniffer
  • WEP/WPA/WPA2 cracker
  • Analyzing and Hash Capturing Tool
  • All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys?

  • Brute Force Attack
  • Dictionary Attack
  • Man-In-The-Middle-Attack
  • None of the above
A

Brute Force Attack

17
Q

[True / False]

A Brute Force Attack could take less than a minute to crack.

18
Q

What type of Brute Force Attack is where the attacker makes logical guesses to crack your authentication system that aren’t assisted by software tools?

  • Reverse Brute Force Attack
  • Hybrid Brute Force Attack
  • Simple Brute Force Attack
  • Strong Brute Force Attack
A

Simple Brute Force Attack

19
Q

Which Brute Force Attack would be where an attacker may use your birth year as a pin?

  • Reverse Brute Force Attack
  • Simple Brute Force Attack
  • Hybrid Brute Force Attack
  • Strong Brute Force Attack
A

Simple Brute Force Attack

20
Q

What type of Brute Force Attack is where they use a simple approach to try and test several possible combinations by guessing possible passwords that are beyond the scope of their logic?

  • Reverse Brute Force Attack
  • Simple Brute Force Attack
  • Hybrid Brute Force Attack
  • Strong Brute Force Attack
A

Hybrid Brute Force Attack

21
Q

Which type of attack is used where an attacker isn’t targeting a specific user, but instead is using a leaked password and testing it against multiple user IDs?

  • Reverse Brute Force Attack
  • Simple Brute Force Attack
  • Hybrid Brute Force Attack
  • Strong Brute Force Attack
A

Reverse Brute Force Attack

22
Q

[True / False]

Dictionary Attack requires an attacker to use ordinary words (as they are in the dictionary) paired with a typical sequence of numbers or special characters in order to crack the password.

23
Q

What type of attack allows attackers to eavesdrop on the communication between two targets?

  • Soldier-In-The-Middle
  • Man-In-The-Middle
  • Hacker-In-The-Middle
  • Attacker-In-The-Middle
A

Man-In-The-Middle

24
Q

[True / False]

PSK is a shared key in between two clients in order to use a “secure” channel.

25
What is the first main step in a successful WPA passive attack? * Using a wireless sniffer or protocol analyzer * Waiting for a wireless client to authenticate through a four-way handshake * Use a Brute Force Attack * None of the above
Waiting for a wireless client to authenticate through a four-way handshake
26
What was the main attack against TKIP? * Hand-Hand * Run-Run * Chop-Chop * Brute Force
Chop-Chop
27
When an attacker truncates the last byte of the encrypted packet and guesses the value, what is the average amount of guesses it takes to guess the right value? * 224 * 100 * 128 * 32
128
28
[True / False] WPA2-PSK (Pre-Shared Key) is the most secure form of encryption used on personal wireless networks.
True
29
[True / False] The main vulnerability on WPA2 was called KRACK – Key Reinstallation Attack.
True
30
[True / False] During a KRACK, the attack is against a 4-way handshake, and does not exploit access points themselves, but instead targets users.
True