Passive Exploitation PE Flashcards

1
Q

True or False: Passive 802.11 Exploitation is the ability to exploit information of already-collected signals WITHOUT transmitting any frames into a wireless network.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: A target is always aware when passive exploitation is being conducted.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When an intruder is not actively doing anything, just monitoring information to exploit at a later time, this is referred to as what type of passive exploitation?

A

Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The settings on a(n) _______ can help the client determine what kind of three specific kinds of encryption to use or not to use.

A

AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The three kinds of 802.11 Encryption are:

A

WEP, WPA, WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wire Equivalency Privacy (WEP), also known as the original IEEE 802.11 standard of encryption, was originally ratified in what year?

A

1997

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wired Equivalent Privacy (WEP), was decommissioned in 2004, and succeeded by what??

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Alongside using the same RC4 stream cipher and CRC-32 checksum, what protocol did WPA use as a solution to WEP shortcomings?

A

Temporal Key Integrity Protocol (TKIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WPA was later succeeded by what?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: WPA2 defines two types of security: Passphrase Authentication and 802.1X/EAP security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passphrase Authentication is for what kinds of networks?

A

Small office/Home office networks (SOHO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.1X/EAP security is for what kinds of networks?

A

Enterprise Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What standard, not protocol, replaced the RC4 Cipher used in WEP and temporal key integrity protocol (TKIP)?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tool is used for wi-fi hacking and security?

A

Aircrack-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Aircrack is an all-in-one tool that can be used as what?

  • Packet Sniffer
  • WEP/WPA/WPA2 cracker
  • Analyzing and Hash Capturing Tool
  • All of the above
A

All of the Above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What kind of attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys?

A

Brute Force Attack

17
Q

True or False: A Brute Force Attack could take less than a minute to crack.

A

True

18
Q

What type of Brute Force Attack is where the attacker makes logical guesses to crack your authentication system that aren’t assisted by software tools?

A

Simple Brute Force Attack

19
Q

Which Brute Force Attack would be where an attacker may use your birth year as a pin?

A

Simple Brute Force Attack

20
Q

What type of Brute Force Attack is where they use a simple approach to try and test several possible combinations by guessing possible passwords that are beyond the scope of their logic?

A

Hybrid Brute Force Attack

21
Q

Which type of attack is used where an attacker isn’t targeting a specific user, but instead is using a leaked password and testing it against multiple user IDs?

A

Reverse Brute Force Attack

22
Q

True or False: Dictionary Attack requires an attacker to use ordinary words (as they are in the dictionary) paired with a typical sequence of numbers or special characters in order to crack the password.

A

True

23
Q

What type of attack allows attackers to eavesdrop on the communication between two targets?

A

MITM

24
Q

True or False: PSK is a shared key in between two clients in order to use a “secure” channel.

A

True

25
Q

What is the first main step in a successful WPA passive attack?

A

Using a wireless sniffer or protocol analyzer

26
Q

What was the main attack against the CRC32 checksum?

A

Chop-Chop

27
Q

When an attacker truncates the last byte of the encrypted packet and guesses the value, what is the average amount of guesses it takes to guess the right value?

A

128

28
Q

True or False: WPA2-PSK (Pre-Shared Key) is the most secure form of encryption used on personal wireless networks.

A

True

29
Q

True or False: The main vulnerability on WPA2 was called KRACK – Key Reinstallation Attack.

A

True

30
Q

True or False: During a KRACK, the attack is against a 4-way handshake, and does not exploit access points themselves, but instead targets users.

A

True