Attacks Flashcards
IV attacks
A wireless initialization vector (IV) attack attempts to discover the pre-shared key from the IV. The IV is simply a number. Some wireless protocols use an IV by combining it with the pre-shared key to encrypt data-in-transit. An IV attack is successful when an encryption system reuses the same IV.
NFC Attack
During an NFC Attack, an attacker uses an NFC reader to capture data from another NFC
device. One method is an eavesdropping attack. The NFC reader uses an antenna to boost its
range, and intercepts the data transfer between two other devices.
Bluejacking
sends information to a device
Bluesnarfing
takes information from a device
Wireless Replay Attacks
In a replay attack, an attacker captures data sent between two entities, modifies it, and
then attempts to impersonate one of the parties by replaying the data. WPA2 using CCMP and AES is not vulnerable to replay attacks. However, WPA using TKIP is vulnerable to replay attacks.
WPS and WPS Attacks
Wi-Fi Protected Setup (WPS) allows users to configure wireless devices without typing in the passphrase. Instead, users can configure devices by pressing buttons or by entering a short eight-digit personal identification number (PIN). For example, a user can configure a new wireless device by pressing a button on the AP
and on the wireless device. It will automatically configure the device within about 30 seconds
with no other actions needed. These buttons can be physical buttons on the devices, or virtual buttons that the user clicks via an application or web page. When using the PIN method, users first identify the eight-digit PIN on the AP and then enter the PIN on the new wireless device. Unfortunately, WPS is susceptible to brute force attacks. A WPS attack keeps trying different PINs until it succeeds. As an example, Reaver is an open source tool freely available that allows
attackers to discover the PIN within 10 hours, and often much quicker. Once it discovers the PIN, it can then discover the passphrase in both WPA and WPA2 wireless networks.
Security experts recommend disabling WPS on all devices. This is typically possible via the
AP configuration page. Even if you choose to enable WPS to easily connect some devices, you should immediately turn it off once you’re done.
VM Escape
VM escape is an attack that allows an attacker to access the host system from within the
virtual system.
Spimming
Spim is a type is spam targeting users of instant message (IM) services SMS or private message within websites and social media.
pass the hash
A password attack that captures and uses the hash of a password. It attempts to log on as the user with the hash and is commonly associated with the Microsoft NTLM protocol.
MAC spoofing
An attack that changes the source MAC address.
replay Attack
An attack where the data is captured and replayed. Attackers typically modify data before replying it
replay Attack
An attack where the data is captured and replayed. Attackers typically modify data before replying it