1.4 Network Attacks Flashcards
Define Evil Twin attack (2 methods)
- Wireless attack where a malicious access point placed near a valid WiFi network and disguised to trick users into connecting to it, instead of the valid WiFi network
OR
- Malicious access point’s broadcast overpowers the valid access points so users connect to it instead
How to protect against Evil Twin attacks
Encrypt communications, such as using a VPN connection when on WiFi networks
Define Rouge Access Point attack
- Installation of a wireless access point on the network that is not authorized
- Can be done for malicious intent, or non-malicious intent, such as by an employee
Define Bluesnarfing (2)
- Connecting via Bluetooth to a device to access data on a mobile device, such as contact lists, emails, calendars, and other data on it
- Vulnerability is patched in newer versions of Bluetooth
Define Bluejacking
Sending unsolicited messages to a mobile device via Bluetooth
Define Wireless Disassociation attack
Denial of Service attack capitalizing on older 802.11 versions taking advantage of unencrypted management frames to forcibly disconnect other clients from the access point
Define Wireless Jamming attack
A Denial of Service attack where the attacker creates additional noise over a WiFi channel to interrupt connectivity
How to detect a jamming attack
Fox-hunt, using a directional antenna to find the source of interference and eliminate it
Define RFID (2 types)
- Passive - RFID chip is not powered
- Active - RFID chip is powered by a battery, some can be re-written
RFID & NFC Vulnerabilities
- Intercepting wireless data - data transmissions may or may not be encrypted
- Jamming - Denial of Service
Define Initialization Vector (IV)
A random value added to an encryption key when encrypting data to strengthen the encryption against being broken
IV Vulnerability and WEP/WPA, aka IV Attack (2)
- WEP & WPA use a 24-bit IV allowing the encryption to be easily broken due to the occurrence of repeated values
- WPA2 & 3 use a 48-bit IV making it very difficult to crack due to it not being repeated
Define On-Path-Attack (previously known as man-in-the-middle or man-in-the-browser)
Interception and relay of communications without being detected by end devices
2 Examples of On-Path-Attacks
- ARP Poisoning - requires on-network access by a device that intercepts communications during transmission over the network
- On-Path browser attack uses malware to intercept communications sent from a web browser prior to encryption
Define ARP Poisoning
- A malicious on-network device redirects network communications through it by poisoning the ARP cache of 2 different devices, such as a router and workstation computer, to impersonate those devices
- Takes advantage of ARP’s lack of security