1.4 - Network Attacks Flashcards
What is a Rogue Access Point attack?
A rogue access point is a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker. An illegitimate access point plugged into a network to create a bypass from outside into the legitimate network.
What is an Evil Twin?
A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. Copy of a legitimate access point. Can scrape credentials or reroute to malicious websites.
What is Bluejacking?
When someone pulls data from an active bluetooth connection. Sending of unsolicited messages to another device via Bluetooth.
What is Bluesnarfing?
When someone puts data in an active bluetooth connection in an unauthorized manner. Can access data on another device. Older devices are more vulnerable.
What is a Wireless Disassociation Attack?
A type of DoS attack in which the attacker breaks the wireless connection between the victim device and the access point.
What is Wireless Jamming?
Interrupting wireless (typically 2.4GHz) signals whether intentionally or unintentionally.
What are some ways that an attacker might cause a wireless jamming?
1) Sending constant, random bits
- Can be legitimate - Data sent at random times
2) Reactive jamming - only disrupt when someone in
particular tries to use wireless
What is a Radio Frequency Identifier (RFID) attack?
An attack that uses middleware to intercept data sent from an RFID device and an RFID reader. It can be used to either clone or spoofing. They can also jam the signal.
What is a Near Field Communication (NFC) attack?
A device is placed that pulls data from an NFC device. It can be used to modify data or eavesdrop.
Define a cryptographic nonce.
A random or pseudo-random number. A password can be calculated using the nonce which makes it impossible to do a replay attack.
Define a salt.
A type of nonce most commonly associated with password randomization. It makes the password unpredictable.
Define an on-path attack.
An attacker captures traffic between an authorized user and a user. They can play that traffic back to the server later to gain access to some kind of resource. Often referred to as a mitm.
What is ARP Poisoning?
A type of on-path attack carried out over a Local Area Network (LAN) that involves sending malicious ARP packets to a default gateway on a LAN in order to change the pairings in its IP to MAC address table.
What does Address Resolution Protocol (ARP) do?
ARP sits between the Network and Data layer, translating between the two of them. It translates from MAC to IP.
Define on-path browser attack.
A form of on-path attack where an attacker is able to insert himself into the communications channel between two trusting parties by compromising a Web browser used by one of the parties, for the purpose of eavesdropping, data theft and/or session tampering. Also known as a man-in-the-browser attack.