Wireless Hacking Flashcards

(20 cards)

1
Q

What protocol was initially introduced to protect wireless traffic?

A

Wired Equivalent Privacy (WEP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Initialization Vector (IV) in WEP.

A

A 24-bit number used once per encryption to increase security, but easily guessable in WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an ARP request replay attack?

A

Capturing ARP packets and repeatedly retransmitting them to generate IVs to crack WEP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What algorithm weakness is exploited by the FMS attack?

A

RC4 Key Scheduling Algorithm weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tool uses the FMS attack method?

A

AirSnort and AirCrack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What replaced WEP due to its vulnerabilities?

A

Wi-Fi Protected Access (WPA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How long can a WPA passphrase be?

A

Between 8 and 63 ASCII characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe the main weakness of WPA-PSK.

A

Static keys vulnerable to brute-force/dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is TKIP and how is it used?

A

Temporal Key Integrity Protocol; used with WPA to dynamically generate keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What encryption does WPA2 utilize?

A

AES (Advanced Encryption Standard) with CCMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What server is typically used for WPA2 Enterprise authentication?

A

RADIUS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define a nonce in wireless security.

A

A number used once to secure communications, preventing replay attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the four-way handshake in WPA/WPA2?

A

Authentication process establishing a secure session between client and AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What vulnerability specifically affects WPA2?

A

KRACK (Key Reinstallation AttaCK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

List some wireless hacking tools.

A

AirCrack, Kismet, Wireshark, Fern WiFi Cracker, Reaver, Wifite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a packet injection attack?

A

Injecting forged packets into a network to facilitate attacks like IV generation.

17
Q

Why is MAC address spoofing used by attackers?

A

To masquerade as authorized devices to bypass security measures.

18
Q

What is a Wi-Fi Pineapple?

A

A tool that acts as a rogue AP, used in penetration tests and man-in-the-middle attacks.

19
Q

What is SSLStrip?

A

An attack that downgrades secure HTTPS connections to unencrypted HTTP.

20
Q

How can wireless attacks be mitigated?

A

Strong encryption (WPA3), regular updates, MAC filtering, hiding SSID, VPN.