1.4 network attacks Flashcards
Rogue Access Point
Unauthorized Access point that does not have any security features
Evil Twin
Access Points that are made to look exactly like the Access Points on your network.
Bluejacking
Unsolicited message sent over Bluetooth
Bluesnarfing
Uses Bluetooth to access data on device
Disassociation
DoS attack the causes devices not be connected to a network
Jamming
DoS attack that cause a prevention in wireless communication because you decrease the signal-to-noise ratio
RFID
Radar tech that doesn’t need power to transmit data.
RFID attack is data stolen because its unsecured
NFC
Same as RFID but has encryption
On-path browser Attacks
(man-in-the-browser attack) Malware on the victims machine without them knowing
Mac Flooding
Switch Table is full so it turns its self to a HUB. Slows down traffic and capture all network
Mac Cloning
Attacker changes their MAC address to a existing MAC address
DoS
On-path Attacks
(man in the middle attack) redirects traffic and ARP Poisoning attacks
DNS Poisoning/ Spoofing
Redirects all traffic to an attackers website
ARP Poisoning
Takes the router IP and MAC. Changes the MAC to the attacker’s MAC then sends info to the victim. Now the victim thinks its talking to the router but instead talks to the attacker
Domain Hijacking
Attacker hack the Domain Registration Account and changes the IP address to theirs. Attackers tries to get login credentials to change it.