MOD 5: Passive 802 Exploitation - PE Flashcards

1
Q

[TRUE / FALSE]

Passive 802.11 Exploitation is the ability to exploit information of already-collected signals WITHOUT transmitting any frames into a wireless network.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A target is always aware when passive exploitation is being conducted.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When an intruder is not actively doing anything, just monitoring information to exploit at a later time, this is referred to as what type of passive exploitation?

  • Targeting
  • Keylogging
  • Backlogging
  • Re-logging
A

Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The settings on a(n) _______ can help the client determine what kind of three specific kinds of encryption to use or not to use.

  • Device
  • Router
  • AP
  • None of These
A

Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The three kinds of 802.11 Encryption are:

  • WEP, WPA1, WPA3
  • WEP, WPA, WPA2
  • WPA1, WPA2, WPA3
  • WEP, WEP2, WPA
A

WEP, WPA, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wire Equivalency Privacy (WEP), also known as the original IEEE 802.11 standard of encryption, was originally ratified in what year?

  • 1992
  • 1994
  • 1995
  • 1997
A

1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wired Equivalent Privacy (WEP), was decommissioned in 2004, and succeeded by what??

  • WEP 2.0
  • WEBV2
  • WPA2
  • WPA
A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alongside using the same RC4 stream cipher and CRC-32 checksum, what protocol did WPA use as a solution to WEP shortcomings?

  • Temporal Key Integrity Protocol (TKIP)
  • Temporal Load Key Protocol (TLKP)
  • Temporary Keyed Initial Protocol (TKIP)
  • None of the above. WEP didn’t have any shortcomings.
A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WPA was later succeeded by what?

  • WPA 1.1
  • WPA 3
  • WPA2
  • WEP2
A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

[True / False]

WPA2 defines two types of security: Passphrase Authentication and 802.1X/EAP security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passphrase Authentication is for what kinds of networks?

  • Enterprise Networks
  • Small office/Home office networks (SOHO)
  • Recreational office/Home office networks (ROHO)
  • Commercial Networks
A

Small office/Home office networks (SOHO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1X/EAP security is for what kinds of networks?

  • Commercial Networks
  • Enterprise Networks
  • Small office/Home office networks (SOHO)
  • None of the above
A

Enterprise Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What standard, not protocol, replaced the RC4 Cipher used in WEP and temporal key integrity protocol (TKIP)?

  • Advanced Encryption Standard (AES)
  • Advanced Clear Text Standard (ACTS)
  • Advanced Key Standard (AKS)
  • Advanced Cipher Standard (ACS)
A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool is used for wi-fi hacking and security?

  • Aircrack
  • CCMP
  • Counter-mode
  • AES
A

Aircrack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Aircrack is an all-in-one tool that can be used as what?

  • Packet Sniffer
  • WEP/WPA/WPA2 cracker
  • Analyzing and Hash Capturing Tool
  • All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys?

  • Brute Force Attack
  • Dictionary Attack
  • Man-In-The-Middle-Attack
  • None of the above
A

Brute Force Attack

17
Q

[True / False]

A Brute Force Attack could take less than a minute to crack.

A

TRUE

18
Q

What type of Brute Force Attack is where the attacker makes logical guesses to crack your authentication system that aren’t assisted by software tools?

  • Reverse Brute Force Attack
  • Hybrid Brute Force Attack
  • Simple Brute Force Attack
  • Strong Brute Force Attack
A

Simple Brute Force Attack

19
Q

Which Brute Force Attack would be where an attacker may use your birth year as a pin?

  • Reverse Brute Force Attack
  • Simple Brute Force Attack
  • Hybrid Brute Force Attack
  • Strong Brute Force Attack
A

Simple Brute Force Attack

20
Q

What type of Brute Force Attack is where they use a simple approach to try and test several possible combinations by guessing possible passwords that are beyond the scope of their logic?

  • Reverse Brute Force Attack
  • Simple Brute Force Attack
  • Hybrid Brute Force Attack
  • Strong Brute Force Attack
A

Hybrid Brute Force Attack

21
Q

Which type of attack is used where an attacker isn’t targeting a specific user, but instead is using a leaked password and testing it against multiple user IDs?

  • Reverse Brute Force Attack
  • Simple Brute Force Attack
  • Hybrid Brute Force Attack
  • Strong Brute Force Attack
A

Reverse Brute Force Attack

22
Q

[True / False]

Dictionary Attack requires an attacker to use ordinary words (as they are in the dictionary) paired with a typical sequence of numbers or special characters in order to crack the password.

A

TRUE

23
Q

What type of attack allows attackers to eavesdrop on the communication between two targets?

  • Soldier-In-The-Middle
  • Man-In-The-Middle
  • Hacker-In-The-Middle
  • Attacker-In-The-Middle
A

Man-In-The-Middle

24
Q

[True / False]

PSK is a shared key in between two clients in order to use a “secure” channel.

A

True

25
Q

What is the first main step in a successful WPA passive attack?

  • Using a wireless sniffer or protocol analyzer
  • Waiting for a wireless client to authenticate through a four-way handshake
  • Use a Brute Force Attack
  • None of the above
A

Waiting for a wireless client to authenticate through a four-way handshake

26
Q

What was the main attack against TKIP?

  • Hand-Hand
  • Run-Run
  • Chop-Chop
  • Brute Force
A

Chop-Chop

27
Q

When an attacker truncates the last byte of the encrypted packet and guesses the value, what is the average amount of guesses it takes to guess the right value?

  • 224
  • 100
  • 128
  • 32
A

128

28
Q

[True / False]

WPA2-PSK (Pre-Shared Key) is the most secure form of encryption used on personal wireless networks.

A

True

29
Q

[True / False]

The main vulnerability on WPA2 was called KRACK – Key Reinstallation Attack.

A

True

30
Q

[True / False]

During a KRACK, the attack is against a 4-way handshake, and does not exploit access points themselves, but instead targets users.

A

True