Analysing Wireless Network Traffic Flashcards

1
Q

Proper uses of packet sniffing

A
  • troubleshooting,
  • application performance
  • monitor consumption trends on a network
  • useful in increasing network security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Improper use of packet sniffing

A

It is a type of attack in which attacker captures packets across a wired connection or wireless connection. The main aim is to capture unencrypted credentials from the network. The common protocols which can be targetted using such attack are FTP, HTTP, SMTP, NNTP, POP, IMAP, Telnet etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active sniffing

A

In this sniffing type, attacker directly interacts with target machine by sending packets and receiving responses.
This sniffing is carried out through Switch. In this type, attacker tries to poison the switch by sending bogus MAC address.

Examples of active sniffing : ARP spoofing, MAC flooding, HTTPS and SSH spoofing, DNS spoofing etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Passive sniffing

A

In this sniffing type, attacker does not interact with the target. He/she simply hook on to the network and captures packets transmitted and received by the network or exchanged between two machines.

This sniffing is carried out through hub. An attacker connects to the hub from his/her machine. Attacker needs account on the LAN.

Examples of passive sniffing: Hub based networks or wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

802.11 Frame types

A
  • Management Frames
  • Control Frames
  • Data Frames
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Management Frame types

A
  • Association Request/Response
  • Reassociation Request/Response
  • Probe Request/Response
  • Beacon
  • Authentication
  • Disassociation
  • Deauthentication
  • Action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Control Frame types

A
  • Request to send (RTS)
  • Clear to Send (CTS)
  • Acknowledgement (ACK)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Data Frame types

A
  • QoS Data
  • Null Data / QoS Null Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC Address

A

A MAC address is a string of characters that identifies a device on a network. It’s tied to a key connection device in your computer called the network interface card, or NIC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Service Set Identifier (Same as ESSID)

A

A service set identifier (SSID) is a sequence of characters that uniquely names a wireless local area network (WLAN). An SSID is sometimes referred to as a “network name.” This name allows stations to connect to the desired network when multiple independent networks operate in the same physical area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Basic Service Set

A

Basic Service Set (BSS), as the name suggests, is basically a network topology that allows all wireless devices to communicate with each other through a common medium i.e. AP (Access point). It also manages these wireless devices or clients. It basically provides a building block to all wireless LAN (Local Area Network). BSS basically contains only one AP that is connected to all stations i.e. all wireless devices within the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Basic Service Set Identifier

A

BSSID stands for Basic Service Set Identifier, and it’s the MAC physical address of the access point or wireless router that is used to connect to the WiFi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Extended Service Set

A

An extended basic service set (ESS) consists of all of the BSSs in the network. For all practical purposes, the ESSID identifies the same network as the SSID does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly