Chapter 13 Wireless and Mobile Security Flashcards
What radio bands does WiFI rely on?
2.4GHz and 5GHz bands.
WiFi security concerns
WiFi can travel beyond the spaces that an organization owns or controls.
WiFi standards/frequencies
- 11b 2.4GHz
- 11a 5GHz
- 11g 2.4GHz
- 11n 2.4 and 5GHz
- 11ac 5GHz
- 11ax 2.4 and 5GHz, additional fq in the 6 GHz band
What range does Bluetooth operate in?
2.4GHz
Bluetooth devices are peer to peer, not client-server.
Are bluetooth devices secure?
No. While bluetooth supports encryption, it replies on a PIN.
What is NFC used for?
What kind of attacks can be used?
very short range, often used for payment terminals.
Interception, replay attacks, spoofing.
How does RFID work?
short range, uses a tag and a receiver to exchange info. can be deployed with:
- active tags with their own power source and alway send signals to reader
- semi-active tags which have battery power for their circuits but are activated by the reader.
- passive tags, which are entirely powered by the reader.
RFID frequency ranges
Low frequency RFID - short range low power tags (entry access and identification)
High frequency tags - longer range, about 1 meter, faster speed.
Ultra high frequency - fastest to read and longest range. inventory and anti theft uses.
RFID attack
RFID tags can be attacked in multiple ways from simple destruction to modification and reprogramming. Tags can be cloned, modified, spoofed, and impersonated.
Infared
only works line of sight
supports everything from low bandwidth to gigabit speeds.
usually used for point to point connections between individual devices.
Infared has largely been replaced by bluetooth and wifi
GPS
GPS signals can be jammed or spoofed.
What is an Evil Twin Attack?
a malicious fake access point that is set up to appear legitimate. once the client connects to the evil twin, the attacker will often provide internet connectivity so the victim does not notice. the attacker can then capture all the victims traffic.
What is a Rogue Access Point?
Rogue access points are APs added to your network either intentionally or unintentionally that can offer a point of entry to attackers or other unwanted users.
Wireless IDS can prevent these
What is bluejacking vs. bluesnarfing?
Bluejacking simply sends unsolicited messages to bluetooth users.
Bluesnarfiing is unauthorized access to the device, typically aimed at data collection.
Best protection against bluetooth attacks?
turn off bluetooth when not in use.
RF and Protocol attacks
What is disassociation?
Disassociation is what happens when a device disconnects from an access point. Many attacks work better if the attacker can force the victim to disconnect from the network.
How can you force a victim to disassociate from a network?
send a deauthentication frame, which is a specific wireless protocol element that can be sent to the access point by spoofing the victims wireless MAC address.
RF and Protocol Attacks: Jamming
Jamming blocks all the traffic in a range or frequency.
Wi-Fi Deauther vs Jammer
deauthers are often incorrectly called jammers. a deauther will send deauthentication frames where a jammer will send out powerful traffic to drown out traffic. Jammers are illegal in the US whereas deauthers are not.
WAP placement
Wireless access point placement can be decided using a site survey and a heat map. This can be done using a WiFi Analyzer software.
WLAN Controllers
Enterprise networks rely on a Wireless LAN (WLAN) controller to help manage access points and networks. Wireless controllers can be hardware devices, cloud service, VM, or software package.