Networks Attacks Flashcards
What is Wireless
Wireless communication is the transfer of information between two or more points that do not use an electrical conductor as a medium for the transfer.
What is Evil twin
A wireless access point that deceives users into believing that it is a legitimate network access point.
might just have a similar name (SSID) to the legitimate one, or the attacker might use some DoS technique to overcome the legitimate WAP. This attack will not succeed if authentication security is enabled on the WAP, unless the attacker also knows the details of the authentication method. However, the evil twin might be able to harvest authentication information from users entering their credentials by mistake.
What is Rogue access point
A rogue access point is one that has been installed on the network without authorization, whether with malicious intent or not. It is vital to periodically survey the site to detect rogue WAPs.
What is Bluesnarfing
A wireless attack where an attacker gains access to unauthorized information on a device using a Bluetooth connection.
What is Bluejacking
Sending an unsolicited message or picture message using a Bluetooth connection.
What is Disassociation
Rather than fully deauthenticating the station. A disassociated station is not completely disconnected, but neither can it communicate on the network until it reassociates.
sends a stream of spoofed frames
What is Jamming
An attack in which radio waves disrupt 802.11 wireless signals.
What is Near-field communication (NFC)
A standard for peer-to-peer (2-way) radio communications over very short (around 4”) distances, facilitating contactless payment and similar technologies. NFC is based on RFID.
What is Radio frequency identifier (RFID)
A means of encoding information into passive tags, which can be easily attached to devices, structures, clothing, or almost anything else.
What is Initialization vector (IV)
Initialization vector (IV) or starting variable (SV)[1] is an input to a cryptographic primitive being used to provide the initial state. The IV is typically required to be random or pseudorandom, but sometimes an IV only needs to be unpredictable or unique.
What is On-path attack (previously known as man-in-the-middle attack/man-in-the-browser attack)
An attack when the web browser is compromised by installing malicious plug-ins or scripts, or intercepting API calls between the browser process and DLLs.
What is Layer 2 attacks
Is the process of using devices and MAC addresses on a LAN to segment a network.
What is Address resolution protocol (ARP) poisoning
A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.
What is Media access control (MAC) flooding
A variation of an ARP poisoning attack where a switch’s cache table is inundated with frames from random source MAC addresses.
What is MAC cloning
MAC Cloning is setting the MAC address of your PC or any other MAC address as your device WAN port and this is one of the methods to fix connectivity issues. MAC stands for Media Access Control and this is the hardware address that the Network Interface Card is manufactured with.