Wireless Attacks Flashcards
Evil twin
This is a kind of wireless spoofing attack. Rouge access point with the same SSID, enables to trick an user into connecting an attacker- controlled network may impersonate a “captive portal” to capture credentials and payment info
Deauthentication
Denial of service attack (DOS), spoofing a disassociate which forces a device to re-associate. Device is continuously kicked offline, also known as disassociation attack, can be precursor for evil twin
Spoofing
Wireless attack, impersonating a wireless device, enables an attacker to act as the trusted source and redirect/ manipulate actions
Jamming
Wireless denial of service attack, overwhelming wireless frequencies with illegitimate traffic. Frequency becomes unavailable for legitimate traffic.
RFID Cloning
Enables attacker to access a system, engage in credit card fraud, and all actions here RFID is used. Wireless spoofing attack.
Replay attack
Wireless sniffing attack capturing and reusing packets . Reusing authentication data/credentials, replaying the packet over and over casing a denial of services
IV attack - initialization vector attack
Wireless sniffing attack - capturing weak initialization vector (IV), knowledge of IV can be used to decrypt data packets
Bluetooth attack
This is an access attacks:
Bluejacking- social engineering-Bluetooth discovery, enables sending unwanted message to Bluetooth device
Bluesnarfing- Bluetooth authentication- discovering and and connecting device with weak or non-existent authentication requirements
NFC bump (Near Field Communication bump)
Enables NFC - enabled attacker to connect an NFC device by being in close enough range
Sniffing
Type of wireless attack, which is capturing wireless data packets. Enables an attacker to eavesdrop, manipulate and/or reuse data packets
Bumping
Unauthorized access to NFC device or transmission
Denial of service
Type of wireless attack, this is overwhelming system resources. Enables an attacker to make services unavailable, for their intended use
Bluesnarfing
Unauthorized Bluetooth connections
Bluesnarfing
Unauthorized Bluetooth connections
Disassociation
Spoofing attack (attacker acts as a trusted source)- a disassociate message is forcing a device to reassociate. Device is continually “knocked offline” also known as deauthentication attack, can be used as a precursor to an evil twin attack