Passive Exploitation PE Flashcards
True or False: Passive 802.11 Exploitation is the ability to exploit information of already-collected signals WITHOUT transmitting any frames into a wireless network.
True
True or False: A target is always aware when passive exploitation is being conducted.
False
When an intruder is not actively doing anything, just monitoring information to exploit at a later time, this is referred to as what type of passive exploitation?
Keylogging
The settings on a(n) _______ can help the client determine what kind of three specific kinds of encryption to use or not to use.
AP
The three kinds of 802.11 Encryption are:
WEP, WPA, WPA2
Wire Equivalency Privacy (WEP), also known as the original IEEE 802.11 standard of encryption, was originally ratified in what year?
1997
Wired Equivalent Privacy (WEP), was decommissioned in 2004, and succeeded by what??
WPA
Alongside using the same RC4 stream cipher and CRC-32 checksum, what protocol did WPA use as a solution to WEP shortcomings?
Temporal Key Integrity Protocol (TKIP)
WPA was later succeeded by what?
WPA2
True or False: WPA2 defines two types of security: Passphrase Authentication and 802.1X/EAP security.
True
Passphrase Authentication is for what kinds of networks?
Small office/Home office networks (SOHO)
802.1X/EAP security is for what kinds of networks?
Enterprise Networks
What standard, not protocol, replaced the RC4 Cipher used in WEP and temporal key integrity protocol (TKIP)?
AES
What tool is used for wi-fi hacking and security?
Aircrack-ng
Aircrack is an all-in-one tool that can be used as what?
- Packet Sniffer
- WEP/WPA/WPA2 cracker
- Analyzing and Hash Capturing Tool
- All of the above
All of the Above