Unit 2 Flashcards

1
Q

How do you gather data fora wireless attack?

A

Social engineering, phishing, pharming, search engine, dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering?

A

Trick people into gaining information/access by relying on their friendliness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do you protect against social engineering?

A

Written policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing?

A

Electronic social engineering - sending an e-mail that tricks people into revealing information by masquerading as a legitimate website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spear phishing?

A

Targeted phishing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is google phishing?

A

Fake search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you recognize phishing?

A

Deceptive URLs, fake sender addresses, e-mails designed like websites - most importantly, no website should be asking you for a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is pharming?

A

Masquerading as legitimate website to get users to reveal passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one overlooked way attackers can do recon?

A

Improperly recycled equipment - data can be retrieved forensically form hard drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is WarWalking (or WarX)

A

Walking around neighbourhood scanning wif networks to build a vulnerability map and share with people.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the danger of unapproved wireless devices in an organization?

A

Can be used by attackers unknowingly to victim (Man in the Middle AttacK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Rogue Access Points?

A

WiFi access point that is not under the management of network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evil Twin Access Points

A

Copies legit SSID and BSSID to trick someone into connecting (can be away from original location [auto-connect])

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a WiFi honeypot?

A

Resembles legitimate AP, poorly secured, to trick attackers into connecting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a MITM attack?

A

Man in the Middle - can be done inside or outside the network to capture traffic (encrypted or unencrypted)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an SSL strip?

A

Secure Socket layer Strip - strips SSL connection between victim and endpoint, connects to attacker endpoint

17
Q

What is DNS spoofing/poisoning

A

Modified DNS entries to direct victims to malicious sites