Hacking Wireless networks Flashcards

1
Q

Wireless technologies

A

-

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of wireless networks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IEEE 802.11 standard

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Types of wireless encryption

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ssid

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name and explain Wi-Fi authentication zones

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a RADRUS service

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of wireless antenna

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is WEP encryption

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many bits initialisation vector is there for WEP

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With Chiper is used in WEP

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which checksum is used for WEP

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is WPA encryption

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which protocol is used in WPA

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does WPA using TKIP eliminate the weaknesses of WEP

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is TSC

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What’s is MSDU

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which checksum is used in WPA

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Temporal key installation flow

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is WPA2 and how does it work?

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Table for WEP VS WPA VS WPA2

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is KSA

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are Initialisation vectors

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

List down wireless threats

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Access control attacks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Integrity attacks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Confidentiality attacks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Availability attacks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Authentication attacks

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Rouge access point attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Client Mis-Association attack

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Mis-configured AccessPoint attack

A

A

33
Q

Unauthorised Association Association

A

A

34
Q

Ad Hoc Connection attack

A

A

35
Q

Honeypot access point attack

A

A

36
Q

AP Mac spoofing

A

A

37
Q

Dos attack

A

A

38
Q

Important Key Reinstallation attack

A

A

39
Q

Jamming signal attack

A

A

40
Q

Wireless hacking methodology

A

A

41
Q

Footprint the wireless network

A

A

42
Q

Find Wi-Fi networks in the range to attack Wi-Fi chalking techniques

A

A

43
Q

WiFi discovery tools

A

A

44
Q

Mobile WiFi discovery tools

A

A

45
Q

WiFi hotspot finder tools

A

A

46
Q

Wardriving

A

A

47
Q

What is the Wi-Fi traffic analysis

A

A

48
Q

Wi-Fi USB dongle AirPcap

A

A

49
Q

Name WiFi 4 Packet Sniffer tools

A

A

50
Q

Aircrack-ng tell me all the subtools

A

A

51
Q

Command to reveal hidden SSIDs

A

A

52
Q

Wireless Fragmentation Attack

A

A

53
Q

How to Launch MAC Spoofing attack

A

A

54
Q

Dos

A

Disassociation and deAuthentication Attacks

55
Q

MITM

A

A

56
Q

Command for MiTm

A

A

57
Q

Wireless ARP poisoning

A

A

58
Q

Rogue Access Points

A

A

59
Q

Important: Evil Twin

A

A

60
Q

How to setup fake hotspot

A

A

61
Q

How to break WEP encryption

A

A

62
Q

Command to crack WEP

A

A

63
Q

How to break WPA and WPA2 Encryption

A

A

64
Q

Command to crack WPA PSK

A

A

65
Q

WPA cracking tools

A

A

66
Q

WiFi sniffer took

A

A

67
Q

Bluetooth stack

A

A

68
Q

Bluetooth Attacks

A

A

69
Q

Bluetooth threats

A

A

70
Q

BlueJack

A

A

71
Q

Wireless Security Layers

A

A

72
Q

How to defend against WPA and 2 cracking

A

A

73
Q

How to defend against KRACK

A

A

74
Q

How to detect rogue AP

A

A

75
Q

How to defend against wireless attack

A

A

76
Q

Wireless IPS

A

A

77
Q

Bluetooth Security Tools

A

A

78
Q

Wireless Penetration Testing

A

A