Mod 6: Active 802 Exploitation - PE Flashcards
What device/devices does a de-authentication attack target?
- Access Point
- Client
- Both of the above
- None of the above
Client
Which two of the following are goals an attacker might have when conducting a de-authentication attack?
- Increasing latency between Access Point and client, degrading service
- Forcing the target to flush it’s ARP cache and send an ARP request
- Causing the target to connect to an Access Point controlled by the attacker
- Capture the password being transmitted from the client to the Access Point
Forcing the target to flush it’s ARP cache and send an ARP request
[TRUE / FALSE]
WEP is inherently more secure than WPA due to it’s usage of a static key.
FALSE
What is the purpose of an ARP request replay attack?
- Actively gather initialization vectors (IVs)
- Overloading the Access Point in order to degrade service
- Passively gather initialization vectors(IV’s)
- Overload the Access Point in order to deny service
Actively gather initialization vectors (IVs)
What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?
- DES
- RSA
- PGP
- AES
AES
[TRUE / FALSE]
WEP is inherently more secure than WPA due to it’s usage of a static key.
FALSE
[TRUE / FALSE]
TKIP ( Temporal Key Integrity Protocol) prevents replay attacks by implementing a sequence counter.
TRUE
What encryption standard was adopted by WPA/WPA2 as an improvement over the previous standard?
- DES
- RSA
- PGP
- AES
AES
[TRUE / FALSE]
When using WPA-PSK, since the encryption strength is constant, password complexity provides no benefit.
FALSE