Chapter 1.4 - Network Attacks Flashcards
Given a scenario, analyze potential indicators associated with network attacks
Evil Twin
Access point that looks like an existing network
Wireless version of phishing
Rogue Access Point
Unauthorized wireless access point
Not necessarily malicious
Potential backdoor
Bluesnarfing
Access a Bluetooth device and transfer data
Examples: contact list, calendar, emails, pictures, videos, etc.
Bluejacking
Sending unsolicited messages to another device via Bluetooth
Disassociation
Cyberattack where a hacker forces a device to lose internet connectivity either temporarily or for an extended time
Wireless DoS attack
Jamming
Prevent wireless communication by transmitting interfering wireless signals
DoS
Could be accidental: microwaves, lights, etc.
Radio Frequency Identification (RFID)
Electromagnetic fields to automatically identify and track tags attached to objects
Examples: access badges, pet/ animal identification, etc.
Near-field Communication (NFC)
Set of communication protocols that enables communication between two electronic devices over a short distance
Initialization Vector (IV)
A type of nonce
Used for randomizing an encryption scheme
Examples: encryption ciphers, WEP, SSL implementations
On-Path Network Attack (man-in-the-middle attack/ main-in-the-browser attack)
When an aggressor sits in the center between two stations and can catch, and sometimes, change that data that is being sent intelligently across the organization
Address Resolution Protocol (ARP) Poisoning
A form of spoofing attack that hackers use to intercept data
Used by attacker in an on-path attack
Media Access Control (MAC) Flooding
The flooding of MAC addresses in the MAC table forcing out the legitimate MAC addresses
Switch begins flooding traffic to all interfaces
Switch turns into a hub and all traffic is transmitted to all interfaces
MAC Cloning
Attacker changes their MAC address to match the MAC address of an existing device
Domain Hijacking
Getting access to the domain registration letting you have control where the traffic goes
DNS Poisoning
When fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website