Module 16 - Hacking Wireless Networks Flashcards

1
Q

Wireless Concepts:

  • a 32 alphanumeric character unique identifier given to wireless local area network (WLAN).
  • Wireless network name
    a. BSSID
    b. GSM
    c. Access Point
    d. SSID (Service Set Identifier)
A

d. SSID (Service Set Identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Concepts:

Which wireless standard can use both the 2.4 and 5 Ghz range and provide speed up to 600 Mbps?

a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16

A

d. 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless Concepts:

Which wireless standard uses the 2.4 Ghz range and provides speeds up to 11 Mbps?

a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16

A

b. 802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless Concepts:

Which standard is used for Bluetooth?

a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16

A

e. 802.15

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Concepts:

Which wireless standard uses the 5 Ghz range and provides speeds up to 54 Mbps?

a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16

A

a. 802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wireless Concepts:

If your entire city is using wireless then you are using what wireless standard?

Also known as WiMAX.

a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16

A

f. 802.16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless Concepts:

Which wireless standard uses the 2.4 Ghz range and provides speeds up to 54 Mbps?

a. 802.11a
b. 802.11b
c. 802.11g
d. 802.11n
e. 802.15
f. 802.16

A

c. 802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Concepts:

-Is a unidirectional antenna commonly used in communications for a frequency bacd of 10 MHz to VHF and UHF.

. Omnidirectional Antenna

. Yagi Antenna

. Dipole Antenna

. Reflector Antenna

A

d. Yagi Antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Concepts:

It provides a 360 degree horizontal radiation pattern. It is used in wireless base stations.

a. Directional Antenna
b. Omnidirectional Antenna
c. Parabolic Grid Antenna
d. Yagi Antenna
e. Dipole Antenna
f. Reflector Antenna

A

b. Omnidirectional Antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Wireless Encryption:

  • Uses a 24-bit initialization vector (IV) to form stream cipher RC4 for confidentiality.
  • It was first cracked in 2007
  • Should not be used
    a. WEP
    b. WPA
    c. WPA2
    d. RADIUS
    e. EAP
A

a. WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Wireless Encryption:

  • It is an advanced wireless encryption protocol using a Temporal Key Integrity Protocol (TKIP) that utilizes the RC4 stream cipher encryption.
    a. WEP
    b. WPA
    c. WPA2
    d. RADIUS
    e. EAP
A

b. WPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless Encryption:

It is an upgrade to WPA using AES and CCMP for wireless data encryption.

a. WEP
b. WPA
c. WPA2
d. RADIUS
e. EAP

A

c. WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless Encryption:

If you are using 802.11i, what wireless encryption is being used?

a. WEP
b. WPA
c. WPA2
d. RADIUS
e. EAP

A

c. WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wireless Encryption:

What is WPA2 that is not using a RADIUS server is called?

A

WPA2-Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless Encryption:

What is WPA2 that is using a RADIUS server is called?

A

WPA2-Enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless Hacking Methodology:

A Method used to draw symbols in public places to advertise open Wi-Fi networks.

a. WarFlying
b. WarChalking
c. WarDriving
d. WarWalking

A

b. WarChalking

17
Q

Wireless Hacking Methodology:

Attackers drive around with Wi-Fi enabled laptops to detect open wireless networks.

a. WarFlying
b. WarChalking
c. WarDriving
d. WarWalking

A

c. WarDriving

18
Q

Wireless Hacking Methodology:

Attackers use drones to detect open wireless netowrks.

a. WarFlying
b. WarChalking
c. WarDriving
d. WarWalking

A

a. WarFlying

19
Q

Wireless Hacking Methodology:

Is a network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2 cracker and analysis tool for 802.11 wireless networks. This program runs under Linux and Windows.

a. Airdriver-ng
b. Aircrack-ng
c. Easside-ng
d. Airbase-ng
e. Wesside-ng

A

b. Aircrack-ng

20
Q

___________ is a short-range wireless communication technology that replaces the cables connecting portable or fixed devices while maintaining high levels of security.

A

Bluetooth

21
Q

Bluetooth Hacking:

DoS attack which overflows Bluetooth-enabled devices with random packets causing the device to crash.

a. Bluejacking
b. Blue Snarfing
c. Bluebugging
d. BluePrinting
e. Bluesmacking

A

e. Bluesmacking

22
Q

Bluetooth Hacking:

The art of sending unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, laptops, etc.

a. Bluejacking
b. Blue Snarfing
c. Bluebugging
d. BluePrinting
e. Bluesmacking

A

a. Bluejacking

23
Q

Bluetooth Hacking:

The theft of information from a wireless device through a Bluetooth connection.

a. Bluejacking
b. Blue Snarfing
c. Bluebugging
d. BluePrinting
e. Bluesmacking

A

b. Blue Snarfing

24
Q

Bluetooth Hacking:

Is the activity of sending anonymous messages over Bluetooth to Bluetooth-enabled devices such as laptops, mobile phones, etc.

-Pairing

A

Bluejacking

Comments:

Bluesmacking (DOS de Bejos) -> overflows devices with random packets. Similar to ICMP ping of death.

Bluejacking -> Send unsolicited messages. (Jack stripador sends a msg you). Similar to email spamming.

Blue Snarfing -> Thef of informations. (O ladrão snarfou o celular do cara!). Exploit the OBEX(Object Exchange protocol). Can get files as a contacts, calendar, etc.

BlueSniff -> Wardriving in mobile to find hidden BT devices.

BlueBugging -> Remote access and perform malicious activities such intercept phone calls, msgs, foward calls, etc.

Blue Printing - > FootPrint technique.

25
Q

Wireless Security Tools:

Protect networks against wireless threats, and enable administrators to detect and prevent various network attacks.

a. WIPS
b. HIPS
c. NIDS
d. IDS

A

a. WIPS

26
Q

Overflows Bluetooth devices with random packets. Similar to ICMP ping of death.

A

Bluesmacking

Cmts:

(DOS de Bejos)

27
Q

Send unsolicited messages to bluetooth devices. Similar to email spamming.

A

Bluejacking

(Jack striper sends a msg you)

28
Q

Thef of informations. Exploit the OBEX(Object Exchange protocol). Can get files as a contacts, calendar, from mobile devices.

A

Blue Snarfing

Hint> (O ladrão snarfou o celular do cara!).

29
Q

Wardriving in mobile to find hidden BT devices.

A

BlueSniff

30
Q

Remote access and perform malicious activities such intercept phone calls, msgs, foward calls, etc.

A

BlueBugging

31
Q

FootPrint technique on mobiles.

A

Blue Printing