WiFi Attack Vectors Flashcards
1
Q
The article describes four examples of the flawed implementation of RC4 in WEP. List 2.
A
The IV is prepended to the key prior to the generation of the key stream & IV is a relatively small (3 bytes)
2
Q
What is wrong with using a sequential IV generator?
A
predictably generates weak IV’s
3
Q
Describe how a PRGA injection attack works?
A
exploits the IV and ciphertext appearing in captured packets
4
Q
Name one tool that produces a PRGA injection attack
A
WEPWedgie
5
Q
Name one tool that breaks the WPA-PSK encryption protocol
A
coWPAtty
6
Q
What is the primary weakness of using EAP/LEAP on Windows computers?
A
NT hashing uses a plaintext value to always hash to the same hashed value