Wireless Flashcards
When assigned or searching for a new target, analysts will source as much intel as possible from all available databases and sources
Initial Intel Dump
determined by the criteria for each particular mission but is narrowed down to one of the following
Target nomination
Collect as able to maintain target awareness
Continue Collection
Active & Passive operations to gain access
Conduct CNE
Disruptive attacks that can alert the target
Conduct CNA
inal part of the Find/Fix/Finish picture. POL efforts must be used to ensure time/location when units conduct
Kill/Capture
Places attacker in the flow of communications with the ability to view, modify, or drop frames in real-time
MitM Attack
is a tool kit that allows attackers to set up rogue APs by monitoring for Probe Requests, a KARMA-based rogue AP replies back immediately.
KARMA
Involves an attacker disguising himself as an application by altering packet headers in an IP address.
IP Spoofing
process of linking an attackers MAC address with the IP address of a legitimate user on a local area network using fake ARP messages.
ARP Spoofing
also known as DNS cache poisoning, involves infiltrating a DNS server and altering a websites address record.
DNS Spoofing
designed to DENY, DEGRADE, DISRUPT, or DESTROY a targets ability to transmit data on a network.
CNA operations
aims to limit or totally block the availability of network resources.
denial of service (DoS)
exploits the RTS/CTS protocol in 802.11 by either sending spoofed CTS frames OR an sending repeated RTS frames to an AP forcing the AP to send CTS commands.
CTS Attack
pushes deauthentication frames as broadcast or unicast to cause clients to attempt to re-authenticate/re-associate with their AP.
Deauthentication attack