Deck A Flashcards
Deck A
What is Bluesnarfing
A cyber attack involving unauthorised access to information from wireless devices through bluetooth
What is Bluejacking
An attack that sends unsolicited messages to Bluetooth-enabled devices
What is BlueSmacking
A Denial of Service attack that overwhelms a device’s Bluetooth connection
What is Bluebugging
A technique used to gain control over a device via Bluetooth
What is BlueBorne
A set of vulnerabilities that allow attackers to take control of devices, spread malware, or perform other malicious activities via Bluetooth
What is KNB
KNB is an attack that manipulates the data encryption process during Bluetooth connection estbalishment, weakening security
What does KNB stand for
Key Negotiation Bluetooth
What does BIAS stand for
Bluetooth Impersonation AttackS
What does BIAS do
BIAS is an attack that exploits the pairing process allowing an attacker to impersonate a trusted device
What is a Car Whisperer
A Bluetooth hack that targets vehicles, attackers can exploit to remotely unlock car doors or even start the engine without physical access
What is bluetooth designed for
Transferring data over short distances from fixed and mobile devices
What is a network of bluetooth devices called
Piconet
What are multiple piconets called when they can interact
Scatternet
What are risks with bluetooth
Unauthorised access, data theft, interference and device tracking
What is the legacy Bluejacking attack
Sending unsolicited messages to Bluetooth-enabled devices, does not involve stealing data but rather an annoyance. AirDrop suffered from Bluejacking when people had Airdrop settings to Everyone, got fixed with Everyone being disabled after 10 min
What is the legacy Bluebugging attack
An attacker gains full contol over a Bluetooth-enabled device allowing them to access and modify information, attacker does this by tricking the victim into pairing with a trusted device or brute forcing a pairing PIN
What is BlueBorn attack
Threat presenting hackers the ability to exploit Bluetooth connections and gain complete control over targeted devices from computers mobile TV etc. did not require them to be paired or set on discoverable mode
What does KNOB or KNB do
Exploits a flaw in the Bluetooth standard to undermine the encryption of Bluetooth connections that during pairing the attacker can intercept and set the length of the encryption key to one byte which can be bruteforced
What are bluetooth attack mitigations
Keep devices updated, disable bluetooth when not needed, don’t connect to random devices
What is Cryptanalysis
Cryptanalysis is the process of decrypting coded or encrypted data without access to the key used in the encryption process
What is Cypher text
Cypher text is the scrambled, unreadable form of the plain text resulting from an encryption algorthm, this transformation is controlled by a key which is used in the encryption/decryption process.
What is a Symmetric encryption
Same key is used for encryption/decryption
What is Asymmetric encryption
Public key is used for encryption and private key is used for decryption
What is frequency analysis
Based on the statistical study of the letters and symbols in the cypher text, if the freq. of characters in the cypher text matches the freq. of letters in the plain text it can provide clues to the substitution used