Chapter 10: Wireless Network Attacks and Defenses Flashcards
How do you mitigate MITM attacks for NFCs?
Devices can be configured in pairing where one device only transmits/sends while the other device can only receive -
How do you prevent eavesdropping with NFCs?
Users should be aware of their surrounding when making payments, don’t let someone get close to intercept
What is a Rouge AP?
An unauthorized access point that allows an attacker to bypass network security configurations
What Bluesnarfing?
An attack that accesses unauthorized information from a wireless device through a Bluetooth connection.
What is Bluejacking?
An attack that sends unsolicited messages to Bluetooth-enabled devices
What is MAC address filtering?
A list to configure on a switch that can either allow all MAC address, deny or allow specific MAC address - It is usually implemented by explicitly specifying the MAC addresses of devices that are allowed to connect instead of preventing
What is RFID cloning?
Capturing data through RFID and then transferring the data to another RFID tag.
What are Thin APs?
APs that do not have a lot of options for configuration
What are Residential WLAN gateways?
An AP that has a lot of configuration options, combines a firewall, router, and DHC into one hardware device
What is jamming in a wireless environment?
Intentionally flooding the radio frequency (RF) spectrum with extraneous RF signal “noise” that creates interference and prevents communications from occurring.
What is EAP?
A framework for transporting authentication protocols instead of the authentication protocol itself
What is PEAP?
Protected EAP - An EAP method designed to simplify the deployment of 802.1x by using Microsoft Windows logins and passwords - Creates encrypted channel between the client and authentication server
What is 802.1x?
A standard for network access control, specifically designed to increase security by providing a way for authenticating devices that connect to a network
What is a duration field values attack?
A wireless attack designed to prevent access to a client through manipulating duration field values.