Wireless Attacks Flashcards

1
Q

Replay (WEP)

Initialization Vector (IV)

Evil Twin

A

Replay - An access point to generate lots of IV packets (usually by replaying ARP packets at it.)

IV - Cryptographic module value that is random or pseudo-random. A requirement may exist that an IV not be reused (as with a nonce).

Evil Twin - Rogue Access Point (AP) masquerades as a legitimate one(Wiphishing).Could have similar SSID.
Attack does not succeed if authentification security is enabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rogue AP

Jamming (Interference)

Wi-Fi Protected Setup (WPS)

A

Rogue AP - unauthorized access point (AP); also capture user log in an attack.

Jamming - Interference from other radio sources; position an evil twin on network in hope of stealing data.
Illegal to use and sell.
Only way to mitigate is locate offending radio sourc and disable or boost signal from legitimate equipment.

WPS- wifi setup with secure access points; push button access; PIN;generates a SSID and Pre-Shared Key (PSK)
Vulnerable to brute-force attack
Pin is 8 characters; 1 is a checksum; other 7 are PINs of 4 and 3 characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluejacking

Bluesnarfing

Radio Frequency Identification (RFID)

A

Bluejacking - a sort of spam where someone sends you an unsolicited text or image
Could be Trojan or malware
Obad Android Trojan malware

Bluesnarfing - using an exploit in Bluetooth to steal information from someone else’s phone. Attackers could circumvent the authentication mechanism.

RFID - encoding information in passive tags on devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Near Field Communications (NFC)

Disassociation

A

NFC - very short range radio link based on RFID
Does not provide encryption; MitM and/or eavesdropping possible attacks.
Google Beam - allows NFC transfers to occur without user intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly