NIS Chapter 08 Flashcards

1
Q

What are rouge access devices?

A

this is a WLAN radio that is connected to the wired infrastructure but is not managed by the network administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In simple terms?

A

Any device with unauthorised WLAN portal to network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the mosr overlooked rogue access device?

A

the IBSS or ad hoc WN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are even printers a risk of being a rogue device?

A

they now come with 802.11 radios with adhoc mode and hackers can connect to these printers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the 5 risks associated with rogue devices?

A
  • Data theft
  • data destruction: db being erased
  • loss of services: disabling services
  • Malicious data insertion: uploading viruses and malicious sw
    Third-PartyAttacks: the attacker can use the rogue AP as a lauching pad for 3rd party attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can rogue APs be prevented?

A
  • banning the use of ad hoc networks
  • settings to diable adhoc on enterprise client devices
  • wired port control using 802.1X/EAP : (does not allow upper layer communication unless credentials are provided in the 2nd layer)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why are WIDS/WIPS used in businesses?

A
  • most businesses do not use 802.1X/EAP wired port control. Gives more information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is port suppression

A

Another method of restriction rogue APs by using SNMP to disable the switch port connected to the rogue AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 2 types of eaves dropping?

A

casual and malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does C.E happen?

A

it is often referred to as WLAN discovery. This discovery can either be passive or active.

Active: have a probe request and listening back for a response

Passive: listening for beacon managment frames being broadcasted by APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What information can be found from the beacon management frames?

A

service set identifier (SSID), MAC
addressing, supported data rates, and other basic service set (BSS) capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give names of tools used to discover WLAN networks

A
  • NetStumbler
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is malicious eavesdropping

A

this is the the use of protocol analysers to capture communication without authority. It is illegal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a protocol analyser?

A

it is a passive devuces that operates in an RF monitoring mode and captures 802.11 frames within its range.

  • can also be used to listen in on exchanges like the 4way handshake
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the risks associated with ED?

A
  • because it is passive, it cannot be picked up by WIPS/WIDS therefore the attack can not be stopped neither can the attacker be located
  • All layer 2 data is in clear text and that can be a passage way to an attack. Even layer 3-7 data can be revealed if encryption is not used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is wired leakage?

A

This is a security risk associated with ed. It is a type of info an attacker can use to gain access to your network or data. It can reveal information about
the wired network as well as what can be seen wirelessly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How can ed be controlled? (4)

A
  • By using encryption to protect the MSDU
  • RFID shielding can be used. Mylar films can be put on windows to stop signals from escaping
  • Special paint/ wallpapers
  • faraday cage:expensive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the most deployed 802.1X/EAP solution and what is the problem with it?

A

LEAP, offline dictionary attacks because hashed pwd is crackable

19
Q

What are the risks associated with auth attakcs

A
  • Data theft
  • Data destruction
  • Loss of services
  • Malicious data
  • Third - party attacks
20
Q

how can these risks be mitigated?

A
  • secure the corporate WLAN
    infrastructure properly with an 802.1X/EAP solution that uses a RADIUS server and the
    tunneled authentication EAP protocols
  • Multifactor authentication,
    also known as two - factor authentication
21
Q

What attack is PSK with WPA/WPA2Personal vulnerable

A

offline brute-force dictionary attacks

22
Q

What can be to mitigate these risks?

A
  • policy mandating 20 char pswd
  • only admins to knoe static pphrase
23
Q

What are the 2 divisions of layer 1 DoS attacks?

A
  • intentional
    -unintentiona
24
Q

what are dos unintentional attacks?

A

through devices like baby monitors, microwaves 2.4GHz waves are transmitted and cause interference

25
Q

Intentional?

A
  • wide or narrow band jamming devices are used 4 this.
  • ## normally to kickstart other attacks
26
Q

What can be used to find causes of interference in your network?

A
  • spectrum analyser
27
Q

WHat are layer 2 Dos?

A
  • they are most often are a result of attacks capturing and retransimitting 802.11 frames using disocc or deauth management frames
28
Q

Why are these attacks possible?

A

deauth or disocc is not a negotiation, but a notification. Since auth has already be done, the reverse is done without a second verification

29
Q

WHat is illegal channel beaconing

A

this is where a spoofed beaxon is transmitted into a legit channel

30
Q

probe response flood?

A

this is where an attacker sends probe response frames to a victim station even when it is alread assoc with an AP it will still attempt to connect to that AP even though it did not send a probe requests

31
Q

what is an assoc flood?

A

looding an AP with bogus assoc request frames to fill up its assoc table. When a legit client attempts to connect, it will be denied for capacity reasons

32
Q

FakeAP?

A

this falsely adverts many fake SSID and BSSIDS so that victim waste time trying to find legit AP

33
Q

What is MAC spoofing

A

impersination of mac address for malicious purposes mostly to bypass mac filtering

34
Q

how can one spoof a mac adress

A

by editing WCard or registry edit

35
Q

How can WIPS mitigate spoofing

A

sequencing frames to keep track of frames sent by a station

36
Q

What is MAC piggy-backing

A

a way to deceive the hospot captive portal login creds in order to gain free internet access

37
Q

How does it occur?

A

an attakcer willl use a protoco; analyse to detemrnign which stations are passing frames to this ap, this would mean they have already been approved by the captive portal. The attacker then clones the MAC of the approved to their wireless card. This is theft if there is payment required to access the wifi

38
Q

What is the evil twin attack?

A

this is where an attacker impersonates an AP

39
Q

How does this attack take place?

A

the attacker will turn their wifi clinet card into an AP transmitting on a different channel and configure it with the same SSID that is being used in the public area. Then they will send disocc or deauth frames and when the clients roam, they will connect to the evil twin

40
Q

How will the Evil twin issue IP address to the clients?

A

configuring a DHCP, at this point the clints are hijacked at a layer 3 level and is free to perform peer or peer attacks

41
Q

What is this DHCP attack that clients can fall pray to?

A

THis is where the attacker exploits the dhcp rocess to dumo rootkits and malware on the victims computer in addition to giving them IPs as expected

42
Q

How can a MITM attack stem from this?

A

SInce bridging of wifi cards is possible, they can bridge a second card to the evil twin. Traffic is then routed from evil twin through the 2nd card back to the original AP and they can sit there undetected

43
Q

What is Wi-Fi phishing

A

After the users
have been hijacked to the evil twin access point, they will be redirected to a login web page
that looks exactly like the hotspot ’ s login page. Then the attacker ’ s fake login page may
request a credit card number from the hijacked user

44
Q

How can all the above mentioned be prevented?

A
  • The only way to prevent a hijacking, man - in - the - middle, or Wi - Fi phishing attack is to
    use a mutual authentication solution
  • t also validate the network to which the user is
    connecting. 802.1X/EAP authentication solutions require that mutual authentication
    credentials be exchanged before a user can be authorized