Passive Exploitation Flashcards

(20 cards)

1
Q

ability to exploit information after collecting signals naturally being sent on a network, without transmitting any frames into a wireless network;
Target is not aware;
Keylogging is an example

A

passive exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If it is turned on, payloads on a data frame will be encrypted;
Settings on an access point tell you which kind to us

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

1997 original IEEE 802.11 standard of encryption;
RC4 cipher for confidentiality;
CRC-32 checksum for integrity

A

Wired Equivalent Privacy (WEP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

24 bit initialization vector;
40-104 bit secret key used by an administrator;
Frame max payload size 2312 bytes;
Predecessor to WPA

A

WEP Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Robust encryption;
Uses TKIP which uses stream ciphers & checksum

A

Wi-Fi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Complex Advanced Encryption Standard (AES);
Two types of security- passphrase authentication for small offices & 802.1X/EAP security for enterprise networks;
counter mode with cipher-block chaining message authentication protocol (CCMP)

A

WPA2 (best one)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

multi-tool which can be used as a packet sniffer, WEP,WPA/WPA2 cracker, analyzing tool and hash capturing tool;
WIFI security & hacking tool pre-installed in Kali Linux

A

aircrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Uses Temporal Key Integrity Protocol (TKIP) as an interim solution to WEP shortcomings which also uses RC4 stream cipher and CRC-32 for the checksum as well

A

Wi-Fi Protected Access (WPA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3 types of attacks that exploit WEP systems:

A

Brute force, dictionary, & man in the middle attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

trial and error to crack passwords, login credentials, and encryption keys

A

brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Attacker makes logical guesses to crack your authentication system, based on details they may have about you

A

simple brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

dictionary attack method + simple brute force attack;
Hacker knows username to carry out a dictionary attack, then carries out a brute force attack (password)

A

hybrid brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Having a known password and running it against multiple users IDs;
Attacker isnt targeting a specific user but instead using a leaked password and testing it against other possible users

A

reverse brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Attacker uses ordinary words, paired with a typical sequence of numbers

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Successful WPa attack involves (3):

A

Capture wireless packets
Wireless clients authenticate with 4 way handshake, exchanging info
Brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

attacker truncates last byte of the encrypted packet and guesses the value and returns the packet to the AP;
weakness of the CRC32 checksum called ICV ;
When they have guessed the right value for the last byte they continue backwards through the rest of the bytes until they have guessed the entire packet;
Average of ___ guesses per byte

A

chop chop attack; 128

17
Q

most secure form of encryption used on personal wireless networks;
Employs AES to encrypt instead of RC4 stream cipher

A

WPA2-PSK(pre-shared key)

18
Q

main vulnerability on WPA2;
When a user joins WiFi a 4-way-handshake is initiated; attacker intercepts connection then forces the re-installation of an already in use encryption key, by manipulating and replaying the cryptographic handshake;
When exploited attacker has access to all unencrypted info

19
Q

client performs the Secure Hash Algorithm 1 (SHA-1) on the shared key with SSID, and attacker targets the user of the 4-way handshake

20
Q

What type of an attack relies on the weakness of the CRC32 checksum?

A

CHOP CHOP ATTACK