Threats and vulnerabilities Flashcards

1
Q

Wireless:

WWWWER.

A

War driving:Driving around with a laptop looking for open wireless access points with which to communicate and looking for weak implementations that can be cracked.

War chalking:Once an open WLAN (or a WLAN whose SSID and authentication credentials are known) is found in a public place, a user might write a symbol on a wall (or some other nearby structure), to let others know the characteristics of the discovered network. This practice, which is a variant of the decades-old practice of hobos leaving symbols as messages to fellow hobos, is called warchalking.

WEP cracking:utilities are available on the Internet for cracking. these cracking utilities can use mathematical algorithms to determine the preshared key (PSK) configured on a wireless AP.

WPA cracking: Slightly harder to crack than WEP but, can still be done in the same manner as with WEP cracking.

Evil twin Legit and malicious AP(access point):
A malicious user could set up his own AP to which legitimate users would connect. Such an AP is called a rogue access point . That malicious user could then use a packet sniffer (which displays information about unencrypted traffic, including the traffic’s data and header information) to eavesdrop on communications flowing through their AP. To cause unsuspecting users to connect to the rogue AP, the malicious user could configure the rogue AP with the same service set identifier (SSID) as used by a legitimate AP. When a rogue AP is configured with the SSID of legitimate AP, the rogue AP is commonly referred to as an evil twin.

Rogue access point
A rogue access point describes a situation in which a wireless access point has been placed on a network without the administrator’s knowledge. The result is that it is possible to remotely access
the rogue access point because it likely does not adhere to company security policies. So all security can be compromised by a cheap wireless router placed on the corporate network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks

A

Denial of service (DoS): flood network with more traffic than it can handle tie down bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly