1.4 Flashcards
Rogue Access Point (rogue AP)
an AP placed within a network w/o official authorization
Evil Twin
a rouge access point w/the same SSID (service set identifier) or similar as a legitimate access point
Bluesnarfing
unauthorized access to, or theft of info from a Bluetooth device
Bluejacking
practice of sending unsolicited messages to nearby Bluetooth devices
Disassociation Attack
effectively removes a wireless client from a wireless network
Jamming
usually prevents all users from connecting to a wireless network
Radio-Frequency Identification (RFID) Systems
used to track and manage inventory and any type of valuable assets
Near Field Communication (NFC)
a way for mobile devices to communicate w/one another when close
Initialization Vector (IV)
the attacker uses packet injection techniques to add additional packets into the data stream
On Path/Man-In-The-Middle Attack
attacker uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two
ARP (address resolution protocol) Poisoning
an attack that misleads computers or switches about the actual MAC (media access control) address of a system
MAC (media access control) Flooding
an attack against a switch that attempts overload it w/different MAC addresses
MAC (media access control) Cloning
changing a system’s MAC (media access control) address
Domain Hijacking
an attacker changes a domain name registration w/o permission from a owner
Domain Name System (DNS poisoning)
attack attempt’s to modify or corrupt DNS (domain name system) data
Uniform Resource Locator (URL) redirection
redirect traffic to different page within a site or even a different site completely
Domain Reputation
helps ISP ( internet service provider) determine the likelihood that an email is being sent by a legitimate organization or its a malicious email
Distributed Denial of Service (DDoS)
attack from one or two more computers against a single target
Network DDoS (distributed denial of service) attack
sustained, abnormally high amount of network traffic on. the NIC(network interface card) of the attacked computer
Application DDoS attack
web servers run web apps and a DDoS then overloads web apps
Operational technology (OT)
methods used to monitor and manage industrial control systems and manufacturing equipment
Powershell
a task based command line shell and scripting language that allows you to enter commands directly
Python
an intercepted programming language that includes extensive libraries which simplifies many programming tasks
Bash
command language interpreter for Unix and Unix-like operating systems