1.4 Network Attacks Flashcards
Rogus access points
is an access point that has been added to your network without your authorization.
wireless evil twin
access point that is designed to look exactly like the access points that are already on your network, but they were put there for a malicious reason
Bluejacking
attacker sending an unsolicited message to a victim’s machine, usually this is a mobile phone or tablet, and the attacker is sending this message over Bluetooth
Bluesnarfing
when an attacker can access data that’s on your mobile device using the Bluetooth communications channel.
wireless disassociation
keeps coming back and disappearing over and over and over again
RFID
Radio-Frequency Identification
NFC
Near Field Communication
on path attack (man in the middle)
an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network
ARP
Address Resolution Protocol
ARP poisoning
manipulating the Address Resolution Protocol (ARP) to link a hacker’s MAC address with the IP address of a legitimate device on a local network
MAC address
Media Access Control address of a network card
STP
Spanning Tree Protocol
Denial of Service
causes a service to become unavailable
DDos
Distributed Denial of Service
what is a DDos
going to use many, many, systems to attack a single service