Chapter 4 Network Attack Indicators Flashcards
What is an Evil Twin Attack?
An attack against the wireless protocol via substitute hardware. The attack uses an access point owned by an attacker that usually has been enhanced with high-power and higher-gain antennas to look like a better connection to the users and compuuters attaching to it.
What is a Rouge Access Point?
An Access Point that is usually placed on an internal network either by accident or for nefarious reasons.
What is Bluesnarfing?
Copying off the victims info such as e-mails, contact lists, calendars, and anything else that exists on that device
What is Bluejacking?
Sending unauthorized messages to another Bluetooth device
What is Disassociation Attacks?
Attacks against a wireless system designed to disassociate a host from the wireless access point and from the wireless network
What is Jamming?
A form of denial of service that specifically targets the radio spectrum aspect of wireless
What is Radio Frequency Identification (RFID) tags
Tags used to identify someone via radio frequency
What is Near Field Communications (NFC)?
A set of wireless tech that enable smartphones and other devices to establish radio communication over a short distance around 10 cm
What is a Initialization Vector (IV)?
Used in wireless systems as the randomization element at the beginning of a connection
What is the Man in the browser (MITB) attack?
A varient of a man in the middle attack, The first element is a malware attack that places a trojan element that can act as a proxy on the target machine. When a user enters info like entering a financial transaction, the malware takes that information after input and then changes it to performs another transaction
What is Address Resolution Protocol (ARP) Poisoning?
When an attacker sends messages, corrupts the ARP table, and causes packets to be misrouted
What is MAC flooding?
An attack where an attacker floods the table with addresses, making the switch unable to find the correct address for a packet
What is MAC cloning?
The act of changing a MAC address to bypass security checks based on the MAC address
What is Domain Hijacking?
The act of changing the registration of a domain name without the permission of its original registrant
What is DNS poisoning?
An attacker changes a DNS record through any of a multitude of means