1.3Wireless Attacks Flashcards
Replay
passive attack where the attacker captures wireless data, records it, and then sends it to the original recipient without them being aware of the attackers presence
IV(initialization vector)
A random number used to increase security by reducing predictability and repeatability
Evil Twin
has same SSID( Service Set Identifier) as a proper access point (AP) once a user connects to it, all wireless traffic goes through it instead of the real AP
Rogue AP
an unauthorized WAP(Wireless Access Point) or wireless router that allows for attackers to bypass many of the network security configurations and opens the network and its users to attacks
Jamming
Disabling a wireless frequency with noise to block the wireless traffic
WPS(WI-FI Protected Setup)
Allows users to easily configure a wireless network, sometimes by only using a pin. The pin can be found through a brute force attack
Bluejacking
Sending Unauthorized messages to a Bluetooth device
Bluesnarfing
Gaining unauthorized access to, or stealing information from a bluetooth device
RFID(Radio Frequency Identifier)
Communicated with a tag placed in or attached to an object using radio signals. can be jammed with noise interference, the blocking of radio signals, or removing/disabling the tags themselves.
NFC(near field communication)
A wireless technology that allows for smartphones and other devices to establich communication over a short distance.
Disassociation
Removes Clients from a wireless network