WiFi Attack Vectors Flashcards

1
Q

The article describes four examples of the flawed implementation of RC4 in WEP. List 2.

A

The IV is prepended to the key prior to the generation of the key stream & IV is a relatively small (3 bytes)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is wrong with using a sequential IV generator?

A

predictably generates weak IV’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how a PRGA injection attack works?

A

exploits the IV and ciphertext appearing in captured packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name one tool that produces a PRGA injection attack

A

WEPWedgie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name one tool that breaks the WPA-PSK encryption protocol

A

coWPAtty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary weakness of using EAP/LEAP on Windows computers?

A

NT hashing uses a plaintext value to always hash to the same hashed value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly