Wireless Attacks Flashcards
Wireless Attack:
Capturing traffic between an endpoint and a wireless access point.
Replay Attack
Wireless Attack:
The randomization element at the beginning of a connection and is targeted for repeatability.
Initialization Vector (IV)
Wireless Attack:
Attackers set up own access point and make it appear like it is a legitimate access point.
Evil Twin
– AND –
Rogue
Wireless Attack:
Evil Twin
– AND –
Rogue
Allow attackers act as
Man in the Middle
MITM
Wireless Attack:
uses 8-digit PIN for authentication and is highly susceptable to brute force attack that an attacker can glean the passphrase from.
Wi-fi Protected Setup (WPS)
Wireless Attack:
Sending unauthorized messages through Bluetooth.
Bluejacking
Wireless Attack:
Attacker connects to victims device via Bluetooth and then copies their information.
Bluesnarfing
Wireless Attack:
Used for security of most buildings and users given access near card reader to gain entrance to a facility.
Radio Frequency Identification (RFID)
Wireless Attack:
Attackers target denial or copying of
RFID
Wireless Attack:
Wireless technologies used for short-range communication with mobile devices that allows mobile phone to pay for stuff and access banking information.
Near-field Communication (NFC)
Wireless Attack:
Kicks devices off of wireless network and banks on reconnect - used to sniff connections to steal passwords.
Disassociation
Cryptographic Attack:
Assumption that there will be a shared password between at least two people in a group.
Birthday Attack
Cryptographic Attack:
If a user was able to glean some ciphertext it could potentially be reverse engineered.
Known Plaintext/Ciphertext.
Password Attack:
Generally speaking the choice of passwords matters and this can be exploited.
Poor password choices
Password Attack:
Attack based on the hash of a password
Rainbow Table