Lesson 10 - Testing Wireless Networks Flashcards

1
Q

What is the attack that can use a Spoofed Mac Address to disrupt the signal to gain access to

A

DE authenticating (deauth) attack

Will boot the victims from AP and forced them to reauthenticate. This will allow the malicious actors to capture the four-way handshake and get the pre-shared key (PSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What tool provides the ability to capture 801.11 frames and then use the output to identify the Basic Service Set ID (MAC Address) of the AP and Victim device

A

Airodum-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a Python script that can jam or disrupt the signals of all WAP in an area

A

wifi jammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the circumstances that can be used to attack the password for WPA and WPA2

A

WPA - susceptible to dictionary attacks if a weak passkey has been chosen

WPA2 - using a key reinstallation attack (KRACK) which can intercept and manipulate the WPA2 4 way handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What tool can be used to attack the WPS function of a WAP and what are some of its limitations?

A

Reaver - CLI tool used to perform brute force attacks against WPS-enabled access points

It is slow and many WAP’s have a lockout function that activates after a certain number of failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an offline attack against a WPS on a WAP called and what tool can be used

A

Pixie Dust
Bully - takes advantage of the way some routers generate random numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the 3 main entities of 802.1X and the many variations of the Extensible Authentication Protocol (EAP)

A

Supplicant - Wifi Client in EAP architecture requesting access

Authenticator - genearlly the WAP or Router that activates the EAPoL and passes authentication data to an authenticating server - Radius

Authentication Server - Radius

Protected Extensible Authentication Protocol (PEAP)

EAP with Tunneled TLS (EAP-TLLS)

EAP with Flexible Authentication via secure tunneling (EAP-FAST)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the EAP protocol implementation that uses a server-side certificate to create a secure tunnel for user Authenticating and what is this referred to as

A

Protected Extensible Authentication Protocol (PEAP)

Inner Method and uses MS-CHAPv2 or EAP-GTC (Generic Token Card)

two requirements:
The inner must be protected and secure

client must validate the server certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the term for a rogue access point used to trick users into believing that it is legitimate

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the principal tools of Aircrack-ng

A

Airmon-ng - will enable/disable monitor mode on a wireless interface

Airodump-ng - provides the ability to captures 802.11 frames and then uses the output to identify the MAC Address of AP and client

Aireplay-ng - inject frames to perform an attack to obtain authentication credentials for an AP. - deauthentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the tool included in Kali Linux that is a wireless sniffer, network detector, and intrusion detection system

A

Kismet - functions mostly on Linux and OSX. For Windows would need a Wi-Fi Pineapple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a good wireless auditing tool that can be used to do a site survey, attack and audit

A

Wifite2

Common attacks
WPS brute force PIN
WPS offline - Pixie
WPA offline crack
WPA Pairwise Master Key Identifier (PMKID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a tool that can spoof or clone a Bluetooth enabled device and what makes Bluetooth different that other wireless technolgies

A

Spooftooph

Bluetooth uses adaptive frequency hopping so attempting to lock into a traditional signal is not possible.

note: command in Linux to configure Bluetooth is hciconfig

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Python Based commercial program used to test wireless networks and runs on Linux OS and what dependencies does it have?

A

Fern -
requires:
Python
Aircrack-NG
Macchanger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the other Python Based toolkit with a range of features and can attack WPA2-Enterprise 802.11a or 802.11n

A

EAPHammer
Requires
apache2, dnsmasq, and libssl-dev

good for Evil Twin and stealing radius credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the powerful LInux WiFi attack tools that has a wide range of attacks

A

MDK4

Mode b - create appearance
Mode a - Authentication DoS will send mult auth frames
Mode p - probes for SSID and bruteforces hidden SSID
mode d - will send deauth to disconnect and dissaociate
mode w - will provoke an IDS/IPS confusion attack

be careful using this tool

17
Q
A