Chapter 13 - Wireless and Mobile Security Flashcards
Cellular
Cellular networks provide connectivity for mobile devices like cell phones by dividing geographic areas into “cells” with tower coverage allowing wireless communications between devices and towers or cell sites.
Bluetooth
Bluetooth, which operates in the 2.4 GHz range, is primarily used for low-power, short-range (typically 5-30 meters) connections that do not have very high bandwidth needs.
Radio Frequency Identification (RFID)
RFID is a relatively short-range wireless technology that uses a tag and a receiver to exchange information. RFID may be deployed using active tags, which have their own power source and always send signals to be read by a reader; semi-active tags, which have a battery to power their circuits but are activated by the reader; or passive tags, which are entirely powered by the reader.
Geolocation
Geolocation uses GPS to determine where a device is located. Geolocation is used for location-aware authentication, geofencing, and many other functions.
Evil Twin
An Evil Twin is a malicious illegitimate access point that is set up to appear to be a legitimate trusted network. Once a client connects to the Evil Twin, the attacker will typically provide Internet connectivity so that the victim does not realize that something has gone wrong.
Rogue Access Point
Rogue Access Points are APs added to your network either intentionally or unintentionally. Once they are connected to your network, they can offer a point of entry to attackers or other unwanted users.
Bluejacking
Bluejacking attacks send unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing
Bluesnarfing is unauthorized access to a Bluetooth device, typically aimed at gathering information like contact lists or other details the device contains.
Disassociation
Disassociation describes what happens when a device disconnects from an access point. Many wireless attacks work better if the target system can be forced to disassociate from the access point that it is using when the attack starts. That will cause the system to attempt to reconnect, providing an attacker with a window of opportunity to set up a more powerful evil twin or to capture information as the system tries to reconnect.
Jamming
Jamming will block all the traffic in the range or frequency it is conducted against. Since Jamming is essentially wireless interference, Jamming may not always be intentional.
Sideloading
Sideloading is the process of transferring files to a mobile device, typically via a USB connection, a MicroSD card, or via Bluetooth in order to install applications outside of the official application store.
Jailbreaking
Jailbreaking takes advantage of vulnerabilities or other weaknesses in a mobile device’s operating system to conduct a privilege escalation attack and root the system, providing the user with more access than is typically allowed.
Site Survey
Site Surveys involve moving throughout the entire facility or space to determine what existing networks are in place and to look at the physical structure for the location options for your access points.
Heatmap
A Heatmap shows where wireless signal is, how strong it is, and what channel or channels each access point or device is using.
WPA2- Personal
WPA2- Personal, also called WPA2-PSK, uses a pre-shared key and allows clients to authenticate without an authentication server infrastructure.