Network Attacks Flashcards
What is 802.1X?
A network protocol for network access control.
Forces users connecting to the network to authenticate regardless of the connection type.
When you authenticate to a network using 802.1X network access control where is your authentication request sent to and validated?
RADIUS server.
Which type of network attack, while not always being inherently malicious, happens when an unauthorized wireless access point is added inside of your network?
Rogue access point.
Which type of network attack sets up an access point to look like an existing network, tricking people into connecting to a network that they did not intend to?
Evil twin attack
Which network attack uses bluetooth connectivity to send unsolicited messages to other devices without giving additional access to the device or posing any security risk other than the unsolicited messages?
Bluejacking
Which type of network attack happens over a bluetooth connection and is used to transfer data from a bluetooth enabled device without authentication?
Bluesnarfing
Which type of network attack takes advantage of unencrypted 802.11 communications and is able to kick an end user off a network causing a significant DoS attack?
Wireless deauthentication
Wireless disassociation attacks
Which type of network attack decreases the signal-to-noise ratio at a network device using a physical device, in order to deny service to people trying to use it?
Wireless jamming. Radio frequency (RF) jamming.
Which types of attack are common with RFID technology?
RFID attacks:
Viewing communications (especially in the data is being transmitted unencrypted)
Spoofing the RFID reader, and writing your own data to the RFID tag
Signal jamming for the purpose of DoS
Decrypting communications, as many of the default decrpytion keys are on google.
What is NFC?
Near field communication. It is a two way wireless communication.
Builds on RFID which is mostly one way.
Short range with encryption support.
Helps with bluetooth pairing and payment systems (like apple pay, holding your phone up to the card machine to pay) by putting a device or tag in close proximity to a reader.
Can also be used to build an NFC access token or identity “card”
Suffers from mostly all of the same attacks as RFID.
What is a cryptographic nonce?
An arbitrary number that is used once, for the time being.
A random or pseduo-random number, something that can’t be reasonably guessed.
Can also be a counter, as long as both sides can keep track of the count.
How would a nonce be used during the login process?
The server would first give you a nonce.
And then calculate your password hash using the nonce.
The end result is that each password hash sent to the host will be different, so a replay attack will not work, if the has is captured in transit.
Since a nonce is most commonly associated with password randomization, how would a nonce be typically used to store a random password hash on a database permanently even if multiple users had the same password?
Salting
MAN IN THE MIDDLE NOW IS CALLED WHAT?
On-path attacks.
PLEASE REMEMBER THIS
Which type of attack creates an environment where all network traffic to the router from a victim’s computer on a local network is relayed through an attackers computer using mac address spoofing and a cache of which IP addresses belong to which mac address?
ARP poisoning