Hacking Wireless networks Flashcards
Wireless technologies
-
Types of wireless networks
A
IEEE 802.11 standard
A
Types of wireless encryption
A
Ssid
A
Name and explain Wi-Fi authentication zones
A
What is a RADRUS service
A
Types of wireless antenna
A
What is WEP encryption
A
How many bits initialisation vector is there for WEP
A
With Chiper is used in WEP
A
Which checksum is used for WEP
A
What is WPA encryption
A
Which protocol is used in WPA
A
How does WPA using TKIP eliminate the weaknesses of WEP
A
What is TSC
A
What’s is MSDU
A
Which checksum is used in WPA
A
Temporal key installation flow
A
What is WPA2 and how does it work?
A
Table for WEP VS WPA VS WPA2
A
What is KSA
A
What are Initialisation vectors
A
List down wireless threats
A
Access control attacks
A
Integrity attacks
A
Confidentiality attacks
A
Availability attacks
A
Authentication attacks
A
Rouge access point attack
A
Client Mis-Association attack
A
Mis-configured AccessPoint attack
A
Unauthorised Association Association
A
Ad Hoc Connection attack
A
Honeypot access point attack
A
AP Mac spoofing
A
Dos attack
A
Important Key Reinstallation attack
A
Jamming signal attack
A
Wireless hacking methodology
A
Footprint the wireless network
A
Find Wi-Fi networks in the range to attack Wi-Fi chalking techniques
A
WiFi discovery tools
A
Mobile WiFi discovery tools
A
WiFi hotspot finder tools
A
Wardriving
A
What is the Wi-Fi traffic analysis
A
Wi-Fi USB dongle AirPcap
A
Name WiFi 4 Packet Sniffer tools
A
Aircrack-ng tell me all the subtools
A
Command to reveal hidden SSIDs
A
Wireless Fragmentation Attack
A
How to Launch MAC Spoofing attack
A
Dos
Disassociation and deAuthentication Attacks
MITM
A
Command for MiTm
A
Wireless ARP poisoning
A
Rogue Access Points
A
Important: Evil Twin
A
How to setup fake hotspot
A
How to break WEP encryption
A
Command to crack WEP
A
How to break WPA and WPA2 Encryption
A
Command to crack WPA PSK
A
WPA cracking tools
A
WiFi sniffer took
A
Bluetooth stack
A
Bluetooth Attacks
A
Bluetooth threats
A
BlueJack
A
Wireless Security Layers
A
How to defend against WPA and 2 cracking
A
How to defend against KRACK
A
How to detect rogue AP
A
How to defend against wireless attack
A
Wireless IPS
A
Bluetooth Security Tools
A
Wireless Penetration Testing
A