1.4 Given a scenario, analyze potential indicators associated with network attacks. Flashcards
Evil twin
Using a false AP, cloning the identity of a legit AP based on client device’s request to connect
Rogue WAP
Access point not authorized by network authorities, usually aren’t configured well for security
Bluesnarfing
Unauthorized access of data via bluetooth connection
Bluejacking
Sending unsolicited messages to bluetooth-capable devices
Disassociation
A wireless management frame, disconnecting clients
Radio frequency identifier (RFID)
Tracking technology based on ability to power a radio transmitter using current generated in an antenna
Jamming
Transmission of radio signals to prevent reliable communications by decreasing effective signal-to-noise ratio
Near field communication (NFC)
A standard establishing radio communications between devices in close proximity
Derivative from RFID
Initialization vector (IV)
Mathematical and cryptographic term for random number
Most modern crypto functions use IV’s to increase security by reducing predictability & repeatability
On-path attack (previously known as man-in-the middle attack/man-in-the-browser attack)
Initially a communications eavesdropping attack, where an attacker then positions themselves between a client and server
Countermeasures to on-path attacks
Strong encryption protocols
Strong authentication
Domain Name System Security Extensions
Mutual cert. authentication
Layer 2 attack
Falsifying layer 2 IP-to-MAC address resolution
Media access control (MAC) flooding
Uses flooding attack to compromise a switch so that the switch gets stuck into flooding all network communications
MAC cloning
Altering a system’s software copy of NIC’s MAC creating frames w/modified or spoofed MAC address
Countermeasures to MAC cloning
Using intelligent switches monitoring for odd MAC address uses
Using NIDS monitoring for MAC address use and abuses
Maintaining an inventory of devices and MAC addresses to confirm if device is authorized or unknown/rogue