Section 8: Wireless Attacks Flashcards

1
Q

Pre-Shared Key

A

Used when the access point and the client need to use the same
encryption key to encrypt and decrypt the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless Security Protocols

A

o Wired Equivalent Privacy (WEP)
▪ Original 802.11 wireless security standard that claims to be as secure as a wired network
▪ WEP was designed to use a static 40-bit pre-shared encryption key with RC4 encryption cipher
▪ WEP’s weakness is its 24-bit initialization vector (IV)

o Wi-Fi Protected Access (WPA)
▪ Replacement for WEP which uses TKIP, Message Integrity Check (MIC), and RC4 encryption
▪ WPA was flawed, so it was replaced by WPA2

o Wi-Fi Protected Access Version 2 (WPA2)
▪ 802.11i standard that provides better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking
▪ WPA2 can be operated in either personal or enterprise mode

o Wi-Fi Protected Access Version 3 (WPA3)
▪ Designed to strengthen the flaws and weakness that can be exploited inside of WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is WEP’s weakness?

A

WEP’s weakness is its 24-bit initialization vector (IV) that is sent in clear text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the largest improvement in WPA3

A

The largest improvement in WPA3 is the removal of the Pre-Shared Key (PSK) exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wi-Fi Protected Setup (WPS)

A

Designed to make setting up new wireless devices easier for consumers and end users
▪ WPS relies on an 8-digit PIN code to conduct its authentication
▪ WPS is vulnerable to attacks and should always be disabled
▪ As a penetration tester, identify those WPS-enabled devices for your engagements

“Button on router”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WiFi Protocol Weakness Table

A

“Open” - No security or encryption used.

WEP - Initialization Vector - Brute Force against Pre-shared Key.

WPA - RC4 and TKIP - Dictionary Attack or Brute Force against a weak PSK

WPA2 - AES and CCMP - Dictionary Attack or Brute Force against a weak PSK

WPA3 - No known weaknesses - Dragonfly (Simultaneous Authentication of Equals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the most commonly used tool for conducting a
deauthentication attack?

A

Aireplay-ng

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Airomon-NG

A

Used to monitor wireless frequencies to identify access points and clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Airodump-NG

A

Used to capture network traffic and save it to a PCAP file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Airocrack-NG

A

Used to conduct protocol and password cracking of wireless encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evil Twin

A

A fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications. Also called a Rogue Access Point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Karma Attack

A

Preferred Network List (PNL)
● A list of the SSIDs of any access points the device has previously
connected to and will automatically connect to when those
networks are in range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ESPortalV2

A

A piece of software for setting up a captive portal and redirecting
all Wi-Fi devices that connect to that portal for authentication

Captive Portals can be used to gather credentials from vicitms, making them “log in” using google before they can access the wifi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Wifiphisher

A

Sets up a regular evil twin without a captive portal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Extensible Authentication Protocol (EAP)

A

Creates an encrypted tunnel between the supplicant and the
authentication server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bluejacking

A

Sending unsolicited messages to a Bluetooth device
▪ No special tools or software is required to conduct bluejacking
▪ Sending information

17
Q

Bluesnarfing

A

Making unauthorized access to a device via Bluetooth connection
▪ Aims to read sensitive data or information from a victim device
▪ Stealing and receiving information

18
Q

BlueBorne

A

Allows the attacker to gain complete control over a device without even being connected to the target device

19
Q

Bluetooth Commands

A

HCICONFIG
● Configures Bluetooth interface

▪ HCITOOL
● Scans and discovers devices in range

▪ BLEAH
● Enumerates Bluetooth devices

▪ GATTTOOL/BETTERCAP/BLUEPY
Interacts and communicates with Bluetooth devices

20
Q

Spooftooph

A

Automates the spoofing or cloning of a Bluetooth device’s name, class, and address

21
Q

How to prevent most Bluetooth techniques?

A

Non-Discoverable Mode

22
Q

Radio Frequency Identification (RFID)

A

SCIF Card
Usually should use a second method of authentication like a password

23
Q

Near Field Communication (NFC)

A

Apple Pay