1.4 Analyze potential indicators associated with network attacks Flashcards
Used to detect the presence of a wireless network.
Wireless scanner/cracker
An attack in which a hacker operates a false access point that will automatically clone, or twin, the identity of an access point based on a client device’s request to connect.
Evil twin attack
May be planted by an employee for convenience, or it may be operated externally by an attacker.
Rogue access point
The unauthorized accessing of data via a Bluetooth connection.
Bluesnarfing
Grants an attacker remote control over the hardware and software of your devices over a Bluetooth connection.
Bluebugging
The sending of unsolicited messages to Bluetooth capable devices without the permission of the owner/user.
Bluejacking
Eavesdropping or packet capturing Bluetooth communications.
Bluesniffing
A DoS attack against a Bluetooth device.
Bluesmacking
A type of wireless management frame that can be used in wireless attacks, including discovering hidden SSIDs, causing a DoS, hijacking sessions, and on-path.
Disassociation
The transmission of radio signals to prevent reliable communications by decreasing the effective signal-to-noise ratio.
Jamming
A tracking technology based on the ability to power a radio transmitter using current generated in an antenna when placed in a magnetic field.
Radio frequency identification
A standard to establish radio communications between devices in close proximity. It is commonly employed for contactless payments.
Near field communication (NFC)
A mathematical and cryptographic term for a random number.
Initialization vector (IV)
A communications eavesdropping attack. Attackers position themselves in the communication stream between a client and server.
On-path attack
When the malware is operating on the victim’s system.
Browser on-path attack
A form of attack in which malicious content is submitted to a vulnerable application, typically a web browser or web server, under the guise of a valid HTML/HTTP header value.
(
HTTP Header manipulation