Wireless Network Attacks & Defenses Flashcards

1
Q

3 Wireless Technologies (mcq)

A

i. Infrared communication
* Line-of-sight
ii. Terrestrial microwave
* Line-of-sight
iii. Radio waves
* High-frequency and low-frequency radio technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of Wireless Networks

A

ref img

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

4 Wireless Network Vulnerabilities

A
  1. Shared media
    * Packets are sent in shared media, accessible to all
    * Packets can be sniffed, hijacked, inserted
  2. Signal Blockage
    * Electromagnetic waves can be blocked by metals, water
    * Bandwidth can be interfered and jammed
  3. No definite borders
    * Packets can be sniffed, hijacked, inserted from anywhere that
    signals can be detected
  4. No fixed points
    * Hard to pin point attacker’s location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 Types of Wireless Network Attacks

A
  1. Reconnaissance Attacks
    * Packet sniffers, Ping sweeps, Port scans
  2. Access Attacks
    * Password attack, Trust exploitation, Man-in-the-middle attack
  3. Denial of Service Attacks
    * Single-Message DoS attacks, Flooding DoS attacks, Distributed
    DoS attacks
    * Signal jamming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPAN - Bluetooth | What is Bluetooth

A
  • is a Radio Frequency (RF) specification
  • for short-range, point-to-point and point-to-multipoint
  • for voice and data transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPAN - Bluetooth | What is it perfect for

A
  1. Small
  2. low power
  3. low cost
  4. good performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WPAN - Bluetooth | What is it useful for

A
  • Cable replacement
  • Data and voice access points
  • Ad hoc networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

4 Bluetooth Attacks

A
  1. Bluejacking
    * An attacker sends unsolicited messages to Bluetooth enabled devices, more annoying than harmful
  2. Bluesnarfing
    * Attack that access unauthorised information from a wireless
    device through Bluetooth connection and steals data stored in
    the device
  3. Bluebugging
    * Attacker connects to target device without knowledge of owner
    and executes commands on the device
  4. Blueborne
    * Attack conducted by exploiting a stack buffer overflow flaw,
    hijacking Bluetooth connections and gaining control of target
    device’s embedded content and functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WLAN – 802.11 | What is it

A
  • The IEEE 802.11 WLAN standard defines how Radio Frequencies in the unlicensed ISM frequency bands is used for the physical layer and the MAC sublayer of wireless links
  • Various implementation of the IEEE 802.11 standard have been developed over the years

TESTED - REF IMAGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

5 WLAN Attacks (First 3)

A
  1. WAR Driving / WAR Walking
    * Access Point / wireless network discovery
    * Wireless location mapping
  2. Wireless Protocol Analyser
    * Captured wireless traffic are captured to decode and analyse contents of packets
    * Wireless network interface card adapters can operate in one of six modes: master (AP), managed (Client), repeater, mesh, ad-hoc, or monitor (Also called Radio Frequency Monitor RFMON)
  3. RF Interference attacks
    * Use equipment to flood RF spectrum with enough interference to impact network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 WLAN Attacks (Last 2)

A
  1. Evil Twin
    * An AP setup to mimic an authorised AP so that user’s device connect to evil twin instead
  2. Rogue Access Points
    * A rogue access point is an unauthorised wireless access point that has been installed on a secure network without explicit authorization from a local network administrator, allowing attackers to bypass network firewall security
    * Use monitoring tools to locate rogue access points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wired Equivalent Privacy (WEP)

A
  • relies on a secret key that is shared between a wireless client device and the access point (AP)
  • A WEP key is an alphanumeric character string that is used for encrypting and decrypting any packet transmitted
  • provides confidentiality to wireless transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WEP Encryption (btr go watch video)

A
  • Integrity Check Value (ICV) is a cyclic redundancy check (CRC) value
    calculated for plaintext
  • Initialization Vector (IV) is a 24-bit randomly generated value each time a packet is encrypted
  • IV and the shared Secret Key are combined to ‘seed’ a random keystream that is combined through exclusive OR (XOR) with the plaintext to form the Cipher text for the packet
  • IV is added to the front of the Cypher Text (“Prepended”) for receiver to decrypt message
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 WEP Weakness (btr go watch video)

A
  1. Encryption key length is too short (64-bit or 128-bit)
  2. Initialization Vector (IV) is too short (24-bit)
  3. WEP implementation produces a detectable pattern that
    attackers can break
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does WEP Weakness happen

A
  • 24 bit IV creates only about 16 thousand possible values (2^24)
  • Reuse of same IV (called a collision) allows attacker to launch keystream
    or IV attack as the same IV and secret key will always create the same keystream
  • Keystream attack is the method of determining the keystream by
    analyzing 2 packets created from the same IV
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used to Crack WEP Secret Key

A

AirSnort/Aircrack-ng

17
Q

How does Cracking WEP Secret Key operate

A
  • It operates by passively monitoring transmissions and computing the encryption key when enough packets have been gathered
  • It requires approx. 5-10 million encrypted packets to be
    gathered, in which it can guess the encryption password in under a second
18
Q

WLAN Security Solutions - WPA (Wi-Fi Protected Access)

A
  • Replace WEP encryption key with Temporal Key Integrity Protocol
    (TKIP) which creates per-packet keys to prevent collision
  • Unlike WEP, preshared keys (PSK) are not used for encryption but
    used as the starting point for generating encryption keys
  • Replaces CRC with Message Integrity Check (MIC) which provides
    integrity check and optional client authentication
19
Q

WLAN Security Solutions - WPA2 (Wi-Fi Protected Access 2)

A
  • Uses the Advanced Encryption Standard (AES) instead of RC4
    cipher
  • Available key length of 128, 192 and 256 bits
20
Q

no

What is WWAN - WiMAX

A

WWAN - WiMAX
* WiMAX tower
- Similar in concept to a cell-phone tower
- Provides coverage to very large area - 8,000 km2

  • A WiMAX receiver
  • Receiver and antenna could be an external device or can be built
    into a laptop like what WiFi access
21
Q

no

Properties of WWAN - WiMAX

A
  • Range
  • 50 km radius from base station
  • Speed
  • 70 megabits per second
  • Line-of-sight not needed between user and base station
  • WiMAX operates similar to WiFi but at higher speeds, over greater
    distances and for a greater number of users
22
Q

no

4 WiMAX Security Issues

A
  1. A flaw in the authentication mechanism used by WiMAX’s privacy
    and key management (PKM) protocol makes WiMAX networks
    susceptible to man-in-the-middle attacks
  2. Management frames are not encrypted, allowing an attacker to
    collect information about subscribers and other potentially
    sensitive network characteristics
  3. Attacker can use legacy management frames to forcibly disconnect legitimate stations
  4. Physical layer denial of service attacks