1.4 Flashcards

1
Q

Rogue access points

A

Unauthorized wireless access point added by employer or attacker, may not be malicious but potentially a back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless evil twin

A

Looks like existing access point for malicious reasons. Getting users to input ssid and sec settings. Can overpower access point and WiFi hotspots

Install vpn. And encrypt!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blue jacking

A

Attacker sending unsolicited Bluetooth message (radius of ten meters) can send other types of message like media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blue snarfing

A

Can access data using Bluetooth like
Calendar email pics etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless jamming / rf jamming

A

The amount of noise is above the good noise for WiFi. Noise is created with sending constant random info or legitimate Frames. Reactive jamming when others send info attacker sends too

Needs to be close

Fox hunting with antenna to triangulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RFID

A

It’s everywhere. Radar technology, powered by receiving signal. It’s wireless
Comms. Can capture transmissions or
Spoof reader. DDos jamming also.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NFC near feild Comms

A

Blue tooth for example . Used
For payments and access tokens. Can be a key to unlock door. It’s wireless and any interference is DDos. Perhaps can be replayed and relayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography without randomization

A

A dog color inverted, can still see outline of dog it’s just inverted cause not random

Add a nonce, for the time being a one time use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptographic nonce

A

Adding nonce to any outgoing or incoming g message for like WEP or SSL. Including password hashes so they are ransomed
For all users in system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On path attack (man in the middle attack)

A

Attacker who sits in middle of message and intercepts, can also modify as transmits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP poisoning

A

ARP has no security, local ip network subnet

Defines who is and gets Max address and IP address revealing all iP and max addresses. It’s saved In arp cache.

Attacker sends unprompted arp message and changes info in arp cache so that any info gets sent to hacker not regularly
Cached com

Need to be on local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

On path browser attack

A

Malware on victim machine, capture data being displayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mac address

A

48 bits/6 bytes long hexidecimal addy of physical network adapter address

12 values, first six is manufacture last six is serial number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lan switching

A

Forward or drop frames based on MAC addy

Gather constantly updating list of mac addy expire in 5 mins

Maintain loop free environment using spanning tree protocol stp

Has limited MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Mac flooding.

A

Attackers sending the above limit of a switches ability to handle MAC addresses , as the max table fills, the switch can’t direct individual frames but sends all frames

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Max cloning or spoofing

A

Match exist allow list to access info, or DDos for switching back and forth to determine where the max addy came from

17
Q

DNS attacks

A

Poison server by modifying host file

By sit in middle with on path attack and modifying query

By modifying dns request by sending fake response to a valid dns request

18
Q

Domain hijacking

A

Brute force, social engineering. Or malware for authentication info on a domain

19
Q

URL hijack

A

Sending to badly named but similar legitimate name for phishing

Typosquatting (incorrect typed)

20
Q

Denial of service

A

Causing a service to stop responding from vulnerability exploitation

Includes botnets but also pulling to power plug. Creating a layer 2 loop that pauses services and no enough resources as well

DDos is when multiple devices cause a site to become unavailable

21
Q

Application dos

A

Zip bomb 42 kilo bytes expanding to 4.5 petabytes

22
Q

Malicious scripts

A

Automatically operated in a quick manner. Automated attack function.

Through Python, powershell, or shellscript in Linux

23
Q

Macros

A

Automated file execution after a file is clicked