Identifying Network Attacks Flashcards
Rogue Access Points
Bad access point that they might use jamming of the legitimate access points to force you to use it.
Evil Twin
Rogue access point using the same SSID as a legitimate one.
Bluejacking
Sending unauthorized messages or data to an unexpected user to a user with bluetooth in discovery mode.
OBEX
Object Exchange protocol (used for sending contact cards and such through phone bluetooth)
Bluesnarfing
Uses Bluetooth to pull data from a users phone when it is discovery mode.
Dissociation
Create DOS by telling the network to disconnect a device from the network
Jamming
Sending out RF noise to Wi-Fi channels making them unusable.
RFID
Radio Frequency Identification is a chip used for mostly inventory tracking. Can be active or passive. Active sends out a signal. Passive has a range of about 1-3 feet.
Near Field Communication (NFC)
Google/Apple Pay. Couple inch communication. Can be used by malicious people to grab data from your device.
IV Attack
Initialization Vector Attack. Weaker encryption like WEP would repeat quickly so attackers would flood the network and sniff the packets to find the IV and then gain access.
WEP
24 bit encryption used in Wireless that is essentially depricated. Used an RC4 stream and sent in clear text.
WPA
Used TKIP with 128 bit encryption. Has been cracked.
WPA2
Uses AES-CCMP with 128 bit encryption. Has a 48 bit IV (Initialization Vector) which makes it exponentially stronger than WEP’s 24bit.
On-Path Attacks (Man in the Middle)
Pineapple
Man in the Browser Attack
Installs bad code in the browser. Could capture data on banking sites etc.
ARP Poisoning
Sends out a spoofed ARP messaged to the LAN (Local Area Network). Allows attacker to intercept data.
ARP
Address Resolution Protocol. Resolves an IP address to a MAC address. Layer 3 (IP Address) to a Layer 1 (Physical machine).
IP/MAC Spoofing
Making your IP or Mac address be that of another user.
MAC Flooding
The switch normally sorts the traffic to the correct MAC address. This attack sends tons of Ethernet frames filling the MAC table on the switch. The switch will then tweak out and start sending out data to all ports cause it doesn’t know where to go resulting in either a DOS attack or allowing the attacker to receive all those packets.
MAC Cloning
Changing the MAC address of a network interface card (NIC).
DNS Poisoning
Telling the DNS to point to an incorrect IP Address. Direct traffic such as credentials to go to a fake site.
Typo Squatting/URL Hijacking
Misspelled URLs like microsft that attackers are holding the site.
DDoS
Large scale DoS attack. Can use bots
Smurf Attack
DDoS attack that spoofs a victims IP and pings a bunch of resources so that they ping back and flood the victims IP slowing it down or making the computer unusuable.
ICMP
Internet Control Message Protocol (PING)