Wireless Attacks Flashcards
Wireless Attack:
Capturing traffic between an endpoint and a wireless access point.
Replay Attack
Wireless Attack:
The randomization element at the beginning of a connection and is targeted for repeatability.
Initialization Vector (IV)
Wireless Attack:
Attackers set up own access point and make it appear like it is a legitimate access point.
Evil Twin
– AND –
Rogue
Wireless Attack:
Evil Twin
– AND –
Rogue
Allow attackers act as
Man in the Middle
MITM
Wireless Attack:
uses 8-digit PIN for authentication and is highly susceptable to brute force attack that an attacker can glean the passphrase from.
Wi-fi Protected Setup (WPS)
Wireless Attack:
Sending unauthorized messages through Bluetooth.
Bluejacking
Wireless Attack:
Attacker connects to victims device via Bluetooth and then copies their information.
Bluesnarfing
Wireless Attack:
Used for security of most buildings and users given access near card reader to gain entrance to a facility.
Radio Frequency Identification (RFID)
Wireless Attack:
Attackers target denial or copying of
RFID
Wireless Attack:
Wireless technologies used for short-range communication with mobile devices that allows mobile phone to pay for stuff and access banking information.
Near-field Communication (NFC)
Wireless Attack:
Kicks devices off of wireless network and banks on reconnect - used to sniff connections to steal passwords.
Disassociation
Cryptographic Attack:
Assumption that there will be a shared password between at least two people in a group.
Birthday Attack
Cryptographic Attack:
If a user was able to glean some ciphertext it could potentially be reverse engineered.
Known Plaintext/Ciphertext.
Password Attack:
Generally speaking the choice of passwords matters and this can be exploited.
Poor password choices
Password Attack:
Attack based on the hash of a password
Rainbow Table
Password Attack:
The best defence against a Rainbow Table attack is to
Salt the hash
Password Attack:
Attack attempts to “guess” passwords
Dictionary Attack
Password Attack:
Tries to guess every possible combination and the length of time of the attack correlates to the length of the password.
Brute Force
Password Attack: Brute Force
Authenication in this brute force attack is against the system.
Online
To prevent an online brute force attack
Lock the account after a few failed attempts or monitor the network.
Password Attack: Brute Force
If an attacker has the password then the attacker can continue to crack it on their own maching
Offline
To prevent Offline brute force attacks
Secure the password file
Password Attack:
This occurs when different inputs yield the same output of a hash function - chaning content with identical hashes would allow access.
Collision
Password Attack:
When supporting backwards compatibility TLS/SSL connections can be downgraded to support lower quality security options.
Downgrade