10A: Discover Wireless Attacks Flashcards

3.2 Given a scenario, research attack vectors and perform wireless attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.

1
Q

An early wireless encryption standard that features the Temporal Key Integrity Protocol (TKIP). TKIP dynamically generates a new 128-bit key for each packet. In addition, this standard includes a Message Integrity Check (MIC), which provides a stronger method (than a CRC) to ensure data integrity

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An improvement of WPA and replaced RC4 and TKIP with Counter Mode CBC-MAC Protocol (CCMP) using AES.

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The latest wireless encryption standard, includes advanced features to secure wireless transmissions such as 192-bit encryption. It also features improved authentication, employs a 48-bit initialization vector, and uses Protected Management Frames (PMFs) to prevent exposure of management traffic.

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A tool that provides the ability to capture 802.11 frames and then use the output to identify the Basic Service Set ID (MAC address) of the access point along with the MAC address of a victim client device.

A

airodump-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack in which radio waves disrupt 802.11 wireless signals.

A

jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command-line tool used to perform brute force attacks against WPS-enabled access points.

A

Reaver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In EAP architecture, the device requesting access to the network.

A

supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A PNAC switch or router that activates EAPoL and passes a supplicant’s authentication data to an authenticating server, such as a RADIUS server.

A

authenticator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EAP implementation that uses a server-side certificate to create a secure tunnel for user authentication, referred to as the inner method.

A

PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A rogue access point that attempts to trick users into believing that it is a legitimate AP, such as an organization’s official Wi-Fi network

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly