Flashcard data - Brainscape (10)
Threats to Bluetooth Devices
Bluejacking
Bluesniping
Bluesnarfing
War Nibbling/Bluecasing
Bluejacking
Sends an unsolicited message to another device that has its Bluetooth connection open.
Bluesniping
Uses a directional antenna to establish connections with Bluetooth‐enabled devices. Bluetooth has a distance limitation, which may prevent a hacker from establishing a connection. In this situation, the hacker can use a directional antenna to establish connections for up to a mile (1.6 kilometers).
Bluesnarfing
Uses the Bluejacking method to connect to the device, then gain access to the address book, contact information, email, and text messages. ___ uses bluetooth to steal information from a wireless device. A ___ attack can occur using unintended Bluetooth pairing.
War Nibbling/Bluecasing
A hacker tries to find unsecured or unpatched Bluetooth connections, then steal information. War Nibbling is similar to War Diving, which is performed on the wireless network.
Radio Frequency Identifier (RFID) attacks
Eavesdropping
Replay
Sniffing
Man-in-the-middle (MITM)
Cloning
Spoofing
Near Field Communication (NFC) attacks
Eavesdropping
Data modification
MITM
Initialization Vector (IV)
By learning the plaintext of one packet, the attacker tries to compute the RC4 keystream generated by the ___.
Domain Hijacking
In this attack, the attacker gains access to the domain registration to get hold of the primary DNS information. Then the attacker simply changes the domain information to point to a domain server controlled by the attacker.