Wireless Attacks Flashcards

1
Q

Evil twin

A

This is a kind of wireless spoofing attack. Rouge access point with the same SSID, enables to trick an user into connecting an attacker- controlled network may impersonate a “captive portal” to capture credentials and payment info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Deauthentication

A

Denial of service attack (DOS), spoofing a disassociate which forces a device to re-associate. Device is continuously kicked offline, also known as disassociation attack, can be precursor for evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing

A

Wireless attack, impersonating a wireless device, enables an attacker to act as the trusted source and redirect/ manipulate actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Jamming

A

Wireless denial of service attack, overwhelming wireless frequencies with illegitimate traffic. Frequency becomes unavailable for legitimate traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RFID Cloning

A

Enables attacker to access a system, engage in credit card fraud, and all actions here RFID is used. Wireless spoofing attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Replay attack

A

Wireless sniffing attack capturing and reusing packets . Reusing authentication data/credentials, replaying the packet over and over casing a denial of services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IV attack - initialization vector attack

A

Wireless sniffing attack - capturing weak initialization vector (IV), knowledge of IV can be used to decrypt data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bluetooth attack

A

This is an access attacks:
Bluejacking- social engineering-Bluetooth discovery, enables sending unwanted message to Bluetooth device
Bluesnarfing- Bluetooth authentication- discovering and and connecting device with weak or non-existent authentication requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

NFC bump (Near Field Communication bump)

A

Enables NFC - enabled attacker to connect an NFC device by being in close enough range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sniffing

A

Type of wireless attack, which is capturing wireless data packets. Enables an attacker to eavesdrop, manipulate and/or reuse data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bumping

A

Unauthorized access to NFC device or transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Denial of service

A

Type of wireless attack, this is overwhelming system resources. Enables an attacker to make services unavailable, for their intended use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bluesnarfing

A

Unauthorized Bluetooth connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bluesnarfing

A

Unauthorized Bluetooth connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Disassociation

A

Spoofing attack (attacker acts as a trusted source)- a disassociate message is forcing a device to reassociate. Device is continually “knocked offline” also known as deauthentication attack, can be used as a precursor to an evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Access attack

A

Wireless access attack is an authentication exploit. Enables unauthorized or unsolicited access to end-user device

17
Q

Access attack

A

Wireless access attack is an authentication exploit. Enables unauthorized or unsolicited access to end-user device

18
Q

RFId eavesdropping

A

Wireless sniffing (taking and manipulating data packets), intercepting communication between RFID tags and readers