Wireless attacks Flashcards
Passive attack where the attacker captures wireless data, records it, and then sends it on to the original recipient without them being aware of the attacker’s presence
Replay
Random number used to increase security by reducing predictability and repeatability.
IV - Initialization Vector
Has the same SSID (Service Set Identifier) as a proper access point (AP). Once a user connects to it, all wireless traffic goes through it instead of the real AP.
Evil twin
An unauthorized WAP (Wireless Access Point) or Wireless Router that allows for attackers to bypass many of the network security configs and opens the network and its users to attacks.
Rogue AP
Disabling a wireless frequency with noise to block the wireless traffic.
Jamming
Allows users to easily configure a wireless network, sometimes by using only a pin that can be found through a brutal force attack.
WPS - WiFi Protected Setup
Sending unauthorized messages to a Bluetooth device
Bluejacking
Gaining unauthorized access to or stealing info from a Bluetooth device
Bluesnarfing
Communicates with a tag placed in or attached to an object using radio signals that can be jammed with noise interference, the blocking of radio signals or removing/disabling the tags themselves
RFID (Radio Frequency Identifier)
A wireless technology that allows for smartphones and other devices to establish communication over a short distance
NFC - Near Field Communication
Removes clients form a wireless network.
Disassociation