Network Attacks Flashcards
Unauthorized wireless access point in your network. Not necessarily malicious. Significant backdoor.
Rogue Access Point
the process of restricting unauthorized users and devices from gaining access to a corporate or private network
Network Access Control
Designed to look like your network’s access points and use the same settings, but is a malicious access point. Trying to overpower the existing access points.
Wireless Evil Twin
Attacker sends unsolicited message to a machine through bluetooth. Low priority security concern.
Bluejacking
Attacker access data on your mobile device using the bluetooth communications channel.
Bluesnarfing
Attacker disrupts connections between users and Wi-fi access points, and forces users to get into a network the attacker controls.
Wireless Disassociation attack
Blocking a wireless device from communicating with other devices or a wireless network
Radio Frequency Jamming (RF)
Hunting a Wireless jamming source with an antenna.
Fox Hunt
Technology that uses radio waves to identify people or objects. A device that reads information contained in a wireless device or “tag” from a distance without making any physical contact or requiring a line of sight. Susceptible to replay attacks, spoofing, data capture, and decryption.
RFID - (Radio Frequency Identification)
Short-range wireless technology that allows your phone to act as a transit pass or credit card, quickly transfer data, or instantly pair with Bluetooth devices like headphones and speakers.
NFC - (Near Field Communication)
A number used to protect private communications by preventing replay attacks. For the time being.
Cryptographic Nonce
Arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.
Initialization Vector
Attacker sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network. Redirects traffic. Also known as Man In The Middle attack.
On-Path Attack
On-path attack on the local IP subnet. It has no security.
ARP Poisoning (Address Resolution Protocol)
Attacker is in the same computer, and a malware/trojan does the proxy work. Formerly known as man-in-the-browser.
On-Path Browser attack