1.4 Flashcards
Given a scenario, analyze potential indicators associated with network attacks.
Is a common networking technology that has a substantial number of standards and processes to connect users to networks via a radio signal, thus freeing machines from wires.
Wireless
type of wireless network attack where a malicious actor sets up a rogue Wi-Fi hotspot with a name identical or similar to a legitimate network.
Evil twin attack
Is an unauthorized and typically malicious wireless access point (AP) that is connected to a network without the knowledge or approval of the network administrator.
Rogue access point
The unauthorized access and theft of information from a Bluetooth-enabled device, such as a mobile phone or laptop, often exploiting vulnerabilities to gain access to personal data without the user’s knowledge or consent.
Bluesnarfing
The act of sending unsolicited messages or data to nearby Bluetooth-enabled devices, such as mobile phones or laptops, without gaining unauthorized access to the device.
Bluejacking
The intentional termination of a connection between a client device and a wireless network.
Disassociation attack
Is a form of denial of service (DoS) that specifically targets the radio spectrum aspect of wireless.
Jamming
A technology that uses wireless communication to identify and track objects or individuals through small electronic tags (RFID tags) .
Radio frequency identification (RFID)
Is a set of wireless technologies that enables smartphones and other devices to establish radio communications over a short distance.
Near-field communication (NFC)
Is used in wireless systems as the randomization element at the beginning of a connection. Attacks against it are aimed at determining the IV, thus finding the repeating key sequence.
Initialization vector (IV)
A type of network attack where the malicious actor positions themselves on the communication path between two entities, such as a client and a server. This allows the attacker to intercept, modify, or manipulate the communication between the two parties.
On-path attack (previously
known as man-in-the-middle attack/
man-in-the-browser attack)
Type of attacks that target the data link layer of the OSI model, focusing on vulnerabilities in network devices like switches and bridges.
Layer 2 attacks
Involves manipulating the ARP cache of a network to associate a fake Media Access Control (MAC) address with a legitimate IP address.
Address Resolution
Protocol (ARP) poisoning
Is the act of changing a MAC address to bypass security checks based on the MAC address.
MAC cloning
Is a type of attack where an attacker floods the network switch with a large number of fake or random MAC addresses.
Media access control (MAC) flooding