Wireless Network Attacks & Defenses Flashcards
1
Q
3 Wireless Technologies (mcq)
A
i. Infrared communication
* Line-of-sight
ii. Terrestrial microwave
* Line-of-sight
iii. Radio waves
* High-frequency and low-frequency radio technology
2
Q
Types of Wireless Networks
A
ref img
3
Q
4 Wireless Network Vulnerabilities
A
- Shared media
* Packets are sent in shared media, accessible to all
* Packets can be sniffed, hijacked, inserted - Signal Blockage
* Electromagnetic waves can be blocked by metals, water
* Bandwidth can be interfered and jammed - No definite borders
* Packets can be sniffed, hijacked, inserted from anywhere that
signals can be detected - No fixed points
* Hard to pin point attacker’s location
4
Q
3 Types of Wireless Network Attacks
A
- Reconnaissance Attacks
* Packet sniffers, Ping sweeps, Port scans - Access Attacks
* Password attack, Trust exploitation, Man-in-the-middle attack - Denial of Service Attacks
* Single-Message DoS attacks, Flooding DoS attacks, Distributed
DoS attacks
* Signal jamming
5
Q
WPAN - Bluetooth | What is Bluetooth
A
- is a Radio Frequency (RF) specification
- for short-range, point-to-point and point-to-multipoint
- for voice and data transfer
6
Q
WPAN - Bluetooth | What is it perfect for
A
- Small
- low power
- low cost
- good performance
7
Q
WPAN - Bluetooth | What is it useful for
A
- Cable replacement
- Data and voice access points
- Ad hoc networks
8
Q
4 Bluetooth Attacks
A
- Bluejacking
* An attacker sends unsolicited messages to Bluetooth enabled devices, more annoying than harmful - Bluesnarfing
* Attack that access unauthorised information from a wireless
device through Bluetooth connection and steals data stored in
the device - Bluebugging
* Attacker connects to target device without knowledge of owner
and executes commands on the device - Blueborne
* Attack conducted by exploiting a stack buffer overflow flaw,
hijacking Bluetooth connections and gaining control of target
device’s embedded content and functions
9
Q
WLAN – 802.11 | What is it
A
- The IEEE 802.11 WLAN standard defines how Radio Frequencies in the unlicensed ISM frequency bands is used for the physical layer and the MAC sublayer of wireless links
- Various implementation of the IEEE 802.11 standard have been developed over the years
TESTED - REF IMAGE
10
Q
5 WLAN Attacks (First 3)
A
- WAR Driving / WAR Walking
* Access Point / wireless network discovery
* Wireless location mapping - Wireless Protocol Analyser
* Captured wireless traffic are captured to decode and analyse contents of packets
* Wireless network interface card adapters can operate in one of six modes: master (AP), managed (Client), repeater, mesh, ad-hoc, or monitor (Also called Radio Frequency Monitor RFMON) - RF Interference attacks
* Use equipment to flood RF spectrum with enough interference to impact network
11
Q
5 WLAN Attacks (Last 2)
A
- Evil Twin
* An AP setup to mimic an authorised AP so that user’s device connect to evil twin instead - Rogue Access Points
* A rogue access point is an unauthorised wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, allowing attackers to bypass network firewall security
* Use monitoring tools to locate rogue access points
12
Q
Wired Equivalent Privacy (WEP)
A
- relies on a secret key that is shared between a wireless client device and the access point (AP)
- A WEP key is an alphanumeric character string that is used for encrypting and decrypting any packet transmitted
- provides confidentiality to wireless transmission
13
Q
WEP Encryption (btr go watch video)
A
- Integrity Check Value (ICV) is a cyclic redundancy check (CRC) value
calculated for plaintext - Initialization Vector (IV) is a 24-bit randomly generated value each time a packet is encrypted
- IV and the shared Secret Key are combined to ‘seed’ a random keystream that is combined through exclusive OR (XOR) with the plaintext to form the Cipher text for the packet
- IV is added to the front of the Cypher Text (“Prepended”) for receiver to decrypt message
14
Q
3 WEP Weakness (btr go watch video)
A
- Encryption key length is too short (64-bit or 128-bit)
- Initialization Vector (IV) is too short (24-bit)
- WEP implementation produces a detectable pattern that
attackers can break
15
Q
How does WEP Weakness happen
A
- 24 bit IV creates only about 16 thousand possible values (2^24)
- Reuse of same IV (called a collision) allows attacker to launch keystream
or IV attack as the same IV and secret key will always create the same keystream - Keystream attack is the method of determining the keystream by
analyzing 2 packets created from the same IV