Wireless Attacks Flashcards

1
Q

Wireless Attack:

Capturing traffic between an endpoint and a wireless access point.

A

Replay Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Attack:

The randomization element at the beginning of a connection and is targeted for repeatability.

A

Initialization Vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Attack:

Attackers set up own access point and make it appear like it is a legitimate access point.

A

Evil Twin
– AND –
Rogue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless Attack:

Evil Twin
– AND –
Rogue

Allow attackers act as

A

Man in the Middle

MITM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Attack:

uses 8-digit PIN for authentication and is highly susceptable to brute force attack that an attacker can glean the passphrase from.

A

Wi-fi Protected Setup (WPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wireless Attack:

Sending unauthorized messages through Bluetooth.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless Attack:

Attacker connects to victims device via Bluetooth and then copies their information.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Attack:

Used for security of most buildings and users given access near card reader to gain entrance to a facility.

A

Radio Frequency Identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Attack:

Attackers target denial or copying of

A

RFID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireless Attack:

Wireless technologies used for short-range communication with mobile devices that allows mobile phone to pay for stuff and access banking information.

A

Near-field Communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wireless Attack:

Kicks devices off of wireless network and banks on reconnect - used to sniff connections to steal passwords.

A

Disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptographic Attack:

Assumption that there will be a shared password between at least two people in a group.

A

Birthday Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptographic Attack:

If a user was able to glean some ciphertext it could potentially be reverse engineered.

A

Known Plaintext/Ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Password Attack:

Generally speaking the choice of passwords matters and this can be exploited.

A

Poor password choices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password Attack:

Attack based on the hash of a password

A

Rainbow Table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Password Attack:

The best defence against a Rainbow Table attack is to

A

Salt the hash

17
Q

Password Attack:

Attack attempts to “guess” passwords

A

Dictionary Attack

18
Q

Password Attack:

Tries to guess every possible combination and the length of time of the attack correlates to the length of the password.

A

Brute Force

19
Q

Password Attack: Brute Force

Authenication in this brute force attack is against the system.

A

Online

20
Q

To prevent an online brute force attack

A

Lock the account after a few failed attempts or monitor the network.

21
Q

Password Attack: Brute Force

If an attacker has the password then the attacker can continue to crack it on their own maching

A

Offline

22
Q

To prevent Offline brute force attacks

A

Secure the password file

23
Q

Password Attack:

This occurs when different inputs yield the same output of a hash function - chaning content with identical hashes would allow access.

A

Collision

24
Q

Password Attack:

When supporting backwards compatibility TLS/SSL connections can be downgraded to support lower quality security options.

A

Downgrade