2.2.3 Information gathering & Vulnerability scanning: active reconnaissance/ Eavesdropping & wardriving Flashcards

1
Q

Eavesdropping: what is it?

A

Refers to the unauthorized interception of private communication, such as phone calls, emails, or data transmissions. In the context of computer networks, eavesdropping can occur through packet sniffing and flow analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Eavesdropping: what methods can you use to do it?

A

● Non-Technical via Social engineering
● Technical via Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Eavesdropping: what are the technical ways to do it (2)?

A

o Packet Sniffing
o Flow Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Eavesdropping: what is packet sniffing and what data can you retrieve?

A

Attacker captures and analyzes data packets as they travel across the network. This can lead to the exposure of sensitive information, including usernames, passwords, and other confidential data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Eavesdropping: what tool can you use for packet sniffing?

A

● Wireshark: Contains a graphical user interface and can be used to capture packets, analyze those packets, and identify the desired information if it was unencrypted when sent
● TCPDump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Eavesdropping: how to perform packet sniffing?

A

● Place network card into promiscuous mode to capture all the traffic it sees and write the packets into a PCAP file
● Set Protocol Analyzer (=packet analyzer): it is a specialized type of software that collects raw packets from the network. Protocol analyzers can help prove or disprove statements made by administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Eavesdropping: is it easier to perform packet capture on wireless network and why?

A

Yes, packet capture is easier to perform on wireless networks since they operate like a hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Eavesdropping: once your packet is capture, what information should you look at?

A

Useful Metadata from Encrypted Data:
● Source/Destination IP/Ports
● Protocol types
● Data volume

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Eavesdropping: what is flow analysis and what informstion can you retrieve from it?

A

▪ Identifies which resources and servers are communicating with which type of devices or locations
▪ Highlights trends and patterns in the network traffic. Attacker can gain insights into the behavior of the network, detect anomalies, and identify potential security vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Eavesdropping: what tools can you use for flow analysis?

A
  • NetFlow
  • sFlow
  • IPFIX
    These tools provide insights into network behavior, such as traffic volume, communication patterns, and the types of traffic traversing the network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eavesdropping: what is the difference between flow analysis and protocol analyzer (=packet analyzer)?

A

Flow analysis focuses on metadata, while protocol analyzers can look into the packets and see the data they contain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wardriving: what is it?

A

Driving around near a facility to detect if there are any wireless networks you can exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wardriving: what is warwalking?

A

Walking around near a facility to detect if there are any wireless networks you can exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wardriving: what type of data should you retrieve from wardriving (3)?

A

▪ Open wireless access points
▪ Encrypted access points: Wireless networks are much less secure than wired networks
▪ Device configurations: Guest network, Business network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wardriving: what is Wigle.net?

A

Maps and indexes all open access points that have been found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wardriving: what are the antenna classification (3)?

A

● Unidirectional: Focuses power in one direction for covering greater distances
● Bidirectional (Dipole): Radiates power equally in two directions
● Omnidirectional: Radiates power equally in all directions

17
Q

Wardriving: which antenna is the best to use for war walking/wardriving?

A

Use omnidirectional antenna for wardriving and warwalking

18
Q

Wardriving: what is Signal-to-Noise Ratio (SNR)?

A

Measures the wireless signal strength in relation to the background nois

19
Q

Wardriving: what is Decibels Per Isotropic (dBi)?

A

Measures the strength of an antenna in terms of how good it can listen and collect information