Identifying Network Attacks Flashcards
Rogue Access Points
Bad access point that they might use jamming of the legitimate access points to force you to use it.
Evil Twin
Rogue access point using the same SSID as a legitimate one.
Bluejacking
Sending unauthorized messages or data to an unexpected user to a user with bluetooth in discovery mode.
OBEX
Object Exchange protocol (used for sending contact cards and such through phone bluetooth)
Bluesnarfing
Uses Bluetooth to pull data from a users phone when it is discovery mode.
Dissociation
Create DOS by telling the network to disconnect a device from the network
Jamming
Sending out RF noise to Wi-Fi channels making them unusable.
RFID
Radio Frequency Identification is a chip used for mostly inventory tracking. Can be active or passive. Active sends out a signal. Passive has a range of about 1-3 feet.
Near Field Communication (NFC)
Google/Apple Pay. Couple inch communication. Can be used by malicious people to grab data from your device.
IV Attack
Initialization Vector Attack. Weaker encryption like WEP would repeat quickly so attackers would flood the network and sniff the packets to find the IV and then gain access.
WEP
24 bit encryption used in Wireless that is essentially depricated. Used an RC4 stream and sent in clear text.
WPA
Used TKIP with 128 bit encryption. Has been cracked.
WPA2
Uses AES-CCMP with 128 bit encryption. Has a 48 bit IV (Initialization Vector) which makes it exponentially stronger than WEP’s 24bit.
On-Path Attacks (Man in the Middle)
Pineapple
Man in the Browser Attack
Installs bad code in the browser. Could capture data on banking sites etc.