Wireless Concept Flashcards
Which type of antenna is used in wireless communication
Omnidirectional
antennas radiate electromagnetic energy in all directions
Omnidirectional
method of digital modulation of data in which a signal, at a chosen frequency, is split into multiple carrier frequencies that are orthogonal (occurring at right angles) to each other
Orthogonal Frequency-division Multiplexing (OFDM)
Influences the spectral efficiency of 4G and 5G wireless communication services. Technique reduces the interference and increases how robust the channel is.
Multiple input, multiple output-orthogonal frequency-division multiplexing (MIMO-OFDM)
Spread spectrum technique that multiplies the original data signal with a pseudo random noise spreading code. Also referred to as a data transmission scheme or modulation scheme, the technique protects signals against interference or jamming.
Direct-sequence Spread Spectrum (DSSS)
Transmitting radio signals by rapidly switching a carrier among many frequency channels
Frequency-hopping Spread Spectrum (FHSS)
Antennas can achieve very long-distance Wi-Fi transmissions by using a highly focused radio beam. This type of antenna is useful for transmitting weak radio signals over very long distances – on the order of 10 miles
A parabolic grid antenna
centralized authentication and authorization management system
RADIUS
protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel.
PEAP
proprietary version of EAP developed by Cisco
LEAP
It is an encryption protocol used in WPA2 for stronger encryption and authentication
CCMP
availability attacks
Beacon Flood, Denial-of-Service, Routing Attacks, Authenticate Flood
Generating thousands of counterfeit 802.11 beacons to make it hard for clients to find a legitimate AP.
Beacon Flood
Exploiting the CSMA/CA Clear Channel Assessment (CCA) mechanism to make a channel appear busy.
Denial-of-Service
Distributing routing information within the network.
Routing Attacks
Sending forged authenticates or associates from random MACs to fill a target AP’s association table.
Authenticate Flood
proof of concept code for a Bluetooth wardriving utility. It is useful for finding hidden and discoverable Bluetooth devices.
BlueSniff
an attack in which an attacker gains remote access to a target Bluetooth-enabled device without the victim being aware of it. In this attack, an attacker sniffs sensitive information and might perform malicious activities such as intercepting phone calls and messages, forwarding calls and text messages, etc.
Bluebugging
Foot printing technique performed by an attacker in order to determine the make and model of the target Bluetooth-enabled device. Attackers collect this information to identify model, manufacturer, etc. and analyze them in an attempt to find out whether the devices are in the range of vulnerability to exploit.
BluePrinting
Attack is a passive attack in which attackers spoof the MAC address of the target Bluetooth-enabled device, in order to intercept or manipulate the data sent towards the target device.
MAC Spoofing Attack
Blackjack Attack
BBProxy
Re-purposed access points that do only packet capturing and analysis (RF sensors) are plugged in all over the wired network to detect and warn the WLAN administrator about any wireless devices operating in the area.
RF Scanning
Network management software uses this technique to detect rogue APs. This software detects devices connected in the LAN, including Telnet, SNMP, CDP (Cisco discovery protocol) using multiple protocols.
Wired Side Inputs
Access points that have the functionality of detecting neighboring APs operating in the nearby area will expose the data through its MIBS and web interface.
AP Scanning
A Virtual Private Network (VPN) is a network that provides secure access to the private network through the internet. VPNs are used for connecting wide area networks (WAN). It allows computers on one network to connect to computers on another network.
Virtual-Private-Network
It is a technique used to provide wireless security by hiding the SSID and network name from public broadcasting. Use SSID cloaking to keep certain default wireless messages from broadcasting the ID to everyone.
SSID Cloaking
use of Bluetooth to send messages to users without the recipient’s consent, similar to email spamming.
Bluejacking
Attack occurs when an attacker sends an oversized ping packet to a victim’s device, causing a buffer overflow
Bluesmacking
a passive attack in which attackers spoof the MAC address of the target Bluetooth-enabled device, in order to intercept or manipulate the data sent towards the target device.
MAC Spoofing