Wireless Network Hacking Flashcards
What vulnerability exists in WPS (Wi-Fi Protected Setup)?
Brute-force, with 11,000 tries or less by providing first 4 numbers instead of the 8.
What is Fragmentation Attack in Wireless Hacking?
Used to help crack the WEP password by obtaining the pseudorandom generation algorithm (PRGA) of captured packets.
What is a Karma Attack?
It is a variant of the evil twin attack. It exploits a device’s Wifi behaviour by connecting to a SSID that was used to connect to in the past. This attack replicates the SSID with a malicious AP instead.
What is a Downgrade Attack?
A downgrade attack is an attack that seeks to cause a connection, protocol, or cryptographic algorithm to drop to an older and less secure version, typically in SSL/TLS.
What is a Deauthentication attack?
Kicking the victim off from the current connected AP. This is done by spoofing the victim’s MAC address and sending the deauthentication frame to the AP. The victim will automatically try reconnecting. Deauthentication attack can be repeated to prevent the victim from establishing stable connection.
What does WEP Stand for?
Wired Equivalent Privacy
What is the bit size for the IV (Initialization Vector) in WEP?
24 bits
What are the 2 possible key lengths for WEP?
40/104 bits
What encryption does WEP use?
RC4
What redundancy check is used in WEP?
CRC-32
What does TKIP stand for?
Temporal Key Integrity Protocol
What does WPA stand for?
Wi-Fi Protected Access
What encryption does WPA use?
RC4 + TKIP
What is the IV bit size for WPA networks?
48 bits
What is the key length for WPA networks?
128 bits
How often does WPA key changes?
Every 10,000 packets
What encryption does WPA2 use?
AES
What type of authentication does WPA2 - Personal use?
Pre-Shared Key.