Wireless attacks Flashcards

1
Q

What is a rouge access point

A

Access point controls in a area throughout the network, if a hacker brings in a rogue access point because it causes the people to disconnect to the actual AP and connect with rogue AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a evil twin attack?

A

This is where a hackers setup a access point with the same name as a legit SSID and causes a DDoS attack or capture information from the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a dissociation attack?

A

If a attacker forges a frame and sends this request on the behalf of the users the AP will boot all the users off the network. Or connect over to a evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a initialization vector?

A

A network has encryption and data is encrypted when its sent and to keep that data looking different a initialization vector is added like a random number or hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a initialization vector attack?

A

This is where a hacker attack the initialization vector with small encryption protocols like 24 bit could be brute force attacked and eventually get cracked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is RFID?

A

A chip or transponder in a card and chip reader and middleware to help with their communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is RFID attack?

A

This is where a attack tries to reverse engineer their communication through power analysis of the communication and then resend that attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a NFC?

A

This is near-field communication, are electric ticket tranfers communication, device pairing, near device comminication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is NFC attack?

A

This is a attacker sends a NFC mole send a card broadcast and talking to the users phone and then gets a card reader to record that communication the attack then gets that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Jamming?

A

Where a communication is sent in the same energy range as a network communication. A attacker can get in between the user and AP they can block their communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a bluetooth attacks

A

Bluejacking - is where a attacker tries to steal the communications sent between the user and a blue tooth device.

Bluesnarfing - the hacker tries to get the user to send them their information by getting between the two devices communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly