1.4 Flashcards
Rogue Access Point (rogue AP)
an AP placed within a network w/o official authorization
Evil Twin
a rouge access point w/the same SSID (service set identifier) or similar as a legitimate access point
Bluesnarfing
unauthorized access to, or theft of info from a Bluetooth device
Bluejacking
practice of sending unsolicited messages to nearby Bluetooth devices
Disassociation Attack
effectively removes a wireless client from a wireless network
Jamming
usually prevents all users from connecting to a wireless network
Radio-Frequency Identification (RFID) Systems
used to track and manage inventory and any type of valuable assets
Near Field Communication (NFC)
a way for mobile devices to communicate w/one another when close
Initialization Vector (IV)
the attacker uses packet injection techniques to add additional packets into the data stream
On Path/Man-In-The-Middle Attack
attacker uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two
ARP (address resolution protocol) Poisoning
an attack that misleads computers or switches about the actual MAC (media access control) address of a system
MAC (media access control) Flooding
an attack against a switch that attempts overload it w/different MAC addresses
MAC (media access control) Cloning
changing a system’s MAC (media access control) address
Domain Hijacking
an attacker changes a domain name registration w/o permission from a owner
Domain Name System (DNS poisoning)
attack attempt’s to modify or corrupt DNS (domain name system) data