Identifying Network Attacks Flashcards

1
Q

Rogue Access Points

A

Bad access point that they might use jamming of the legitimate access points to force you to use it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Evil Twin

A

Rogue access point using the same SSID as a legitimate one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluejacking

A

Sending unauthorized messages or data to an unexpected user to a user with bluetooth in discovery mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

OBEX

A

Object Exchange protocol (used for sending contact cards and such through phone bluetooth)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluesnarfing

A

Uses Bluetooth to pull data from a users phone when it is discovery mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dissociation

A

Create DOS by telling the network to disconnect a device from the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Jamming

A

Sending out RF noise to Wi-Fi channels making them unusable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

RFID

A

Radio Frequency Identification is a chip used for mostly inventory tracking. Can be active or passive. Active sends out a signal. Passive has a range of about 1-3 feet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Near Field Communication (NFC)

A

Google/Apple Pay. Couple inch communication. Can be used by malicious people to grab data from your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IV Attack

A

Initialization Vector Attack. Weaker encryption like WEP would repeat quickly so attackers would flood the network and sniff the packets to find the IV and then gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WEP

A

24 bit encryption used in Wireless that is essentially depricated. Used an RC4 stream and sent in clear text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

WPA

A

Used TKIP with 128 bit encryption. Has been cracked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WPA2

A

Uses AES-CCMP with 128 bit encryption. Has a 48 bit IV (Initialization Vector) which makes it exponentially stronger than WEP’s 24bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-Path Attacks (Man in the Middle)

A

Pineapple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Man in the Browser Attack

A

Installs bad code in the browser. Could capture data on banking sites etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP Poisoning

A

Sends out a spoofed ARP messaged to the LAN (Local Area Network). Allows attacker to intercept data.

17
Q

ARP

A

Address Resolution Protocol. Resolves an IP address to a MAC address. Layer 3 (IP Address) to a Layer 1 (Physical machine).

18
Q

IP/MAC Spoofing

A

Making your IP or Mac address be that of another user.

19
Q

MAC Flooding

A

The switch normally sorts the traffic to the correct MAC address. This attack sends tons of Ethernet frames filling the MAC table on the switch. The switch will then tweak out and start sending out data to all ports cause it doesn’t know where to go resulting in either a DOS attack or allowing the attacker to receive all those packets.

20
Q

MAC Cloning

A

Changing the MAC address of a network interface card (NIC).

21
Q

DNS Poisoning

A

Telling the DNS to point to an incorrect IP Address. Direct traffic such as credentials to go to a fake site.

22
Q

Typo Squatting/URL Hijacking

A

Misspelled URLs like microsft that attackers are holding the site.

23
Q

DDoS

A

Large scale DoS attack. Can use bots

24
Q

Smurf Attack

A

DDoS attack that spoofs a victims IP and pings a bunch of resources so that they ping back and flood the victims IP slowing it down or making the computer unusuable.

25
Q

ICMP

A

Internet Control Message Protocol (PING)