Hacking Wireless Networks - Wireless Attack Countermeasures

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/105

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

106 Terms

1
New cards

How many layers does a wireless security mechanism have?

6

2
New cards

What are the six layers of the wireless security mechanism?

Wireless signal security, Connection security, Device security, Data protection, Network protection, and End-user protection

3
New cards

What is used for wireless attack countermeasures?

Use a password with at least 12-16 characters, including uppercase and lowercase letters, numbers, and special characters

4
New cards

What is used for wireless attack countermeasures?

Disable TKIP in the router settings and ensure only AES encryption is used

5
New cards

What is used for wireless attack countermeasures?

Turn off WPS in the router settings to prevent brute-force attacks on the WPS PIN

6
New cards

What is used for wireless attack countermeasures?

Check the manufacturer's website regularly for firmware updates and apply them promptly

7
New cards

What is used for wireless attack countermeasures?

Limit the Wi-Fi signal range to reduce the chances of unauthorized access from outside the premises

8
New cards

What is used for wireless attack countermeasures?

Use network monitoring tools to detect and respond to suspicious activities

9
New cards

What is used for wireless attack countermeasures?

Use WPA3-SAE wherever possible for all devices that support it

10
New cards

What is used for wireless attack countermeasures?

Disable transition mode if all devices support WPA3 to ensure the highest level of security

11
New cards

What is used to defend against aLTEr Attacks?

Encrypt DNS queries and only use trusted DNS resolvers

12
New cards

What is used to defend against aLTEr Attacks?

Resolve DNS queries using the HTTPS protocol

13
New cards

What is used to defend against aLTEr Attacks?

Use DNS over TLS or DTLS to provide encryption and integrity-protection to the DNS traffic

14
New cards

What is used to defend against aLTEr Attacks?

Implement RFC 7858/RFC 8310 to prevent DNS spoofing attacks

15
New cards

What is used to defend against aLTEr Attacks?

Use DNSCrypt protocol to authenticate communication between a DNS client and DNS resolver

16
New cards

What is used to defend against aLTEr Attacks?

Use strong encryption algorithms such as AES-256 to ensure that all communications are encrypted end-to-end

17
New cards

What is used to defend against aLTEr Attacks?

Use mutual authentication mechanisms to verify the identity of both parties in the communication process

18
New cards

What should you disable if all devices support WPA3 to ensure the highest level of security? WPA3 allows for WPA2/WPA3 mixed mode, which can pose a potential security risk.

Disable Transition Mode

19
New cards

What is used to defend against KRACK attacks?

Update all the routers and Wi-Fi devices with the latest security patches.

20
New cards

What is used to defend against KRACK attacks?

Turn on auto updates for all the wireless devices and patch the device firmware.

21
New cards

What is used to defend against KRACK attacks?

Avoid using public Wi-Fi networks.

22
New cards

What is used to defend against KRACK attacks?

Browse only secured websites and do not access sensitive resources when the device is connected to an unprotected network

23
New cards

What is used to defend against KRACK attacks?

If there are IoT devices, audit the devices and do not connect to insecure Wi-Fi routers.

24
New cards

What is used to defend against KRACK attacks?

Always enable the HTTPS Everywhere extension.

25
New cards

What is used to defend against KRACK attacks?

Enable two-factor authentication

26
New cards

What is used to defend against KRACK attacks?

Use a VPN to secure information in transit.

27
New cards

What is used to defend against KRACK attacks?

Always use the Wi-Fi Protected Access 3 (WPA3) security protocol for wireless networks.

28
New cards

What is used to defend against KRACK attacks?

Disable fast roaming and the repeater mode in wireless devices to improve the mitigation of KRACK attacks.

29
New cards

What is used to defend against KRACK attacks?

Employ the EAPOL-key replay counter to ensure that the AP recognizes only the latest counter value.

30
New cards

What is used to defend against KRACK attacks?

Use a backup wired connection (Ethernet) or mobile data immediately when a vulnerability to KRACK attacks is detected.

31
New cards

What is used to defend against KRACK attacks?

Employ alternative third-party routers instead of ISP-provided routers if they do not provide sufficient security patches.

32
New cards

What is used to defend against KRACK attacks?

Use network segmentation to separate critical parts of a network from general user access to limit the potential impact of a KRACK attack.

33
New cards

What is used to defend against KRACK attacks?

Temporarily disable the 802.11r protocol, which is susceptible to KRACK attacks. Turn off 802.11r in the wireless network settings if not needed for seamless roaming.

34
New cards

What is used to defend against KRACK attacks?

Use 802.1X authentication for an added layer of security. Implement 802.1X with RADIUS server authentication for enterprise networks.

35
New cards

What is used to defend against aLTEr attacks?

Encrypt DNS queries and use only trusted DNS resolvers.

36
New cards

What is used to defend against aLTEr attacks?

Resolve DNS queries using the HTTPS protocol.

37
New cards

What is used to defend against aLTEr attacks?

Access only websites having HTTPS connections.

38
New cards

What is used to defend against aLTEr attacks?

Use DNS over the Transport Layer Security (TLS) or DNS over datagram TLS (DTLS) to encrypt the DNS traffic and for integrity protection.

39
New cards

What is used to defend against aLTEr attacks?

Implement RFC 7858/RFC 8310 to prevent DNS spoofing attacks. It can also increase the encryption and intelligent policies for name resolution.

40
New cards

What is used to defend against aLTEr attacks?

Add a message authentication code (MAC) to user plane packets.

41
New cards

What is used to defend against aLTEr attacks?

Use the DNSCrypt protocol to authenticate communication between a DNS client and a DNS resolver.

42
New cards

What is used to defend against aLTEr attacks?

Use mobile device tools such as Zimperium to detect phishing and other attacks from malicious sites.

43
New cards

What is used to defend against aLTEr attacks?

Use correct HTTPS parameters, such as HSTS, to avoid being redirected to a malicious website.

44
New cards

What is used to defend against aLTEr attacks?

Use a virtual network tunnel with integrity protection and endpoint authentication.

45
New cards

What is used to defend against aLTEr attacks?

Upgrade to 5G network connection.

46
New cards

What is used to defend against aLTEr attacks?

Implement eSIM technology for improved authentication and encryption.

47
New cards

What is used to defend against aLTEr attacks?

Implement DNSSEC to secure DNS lookup processes, which ensures authenticity of response data.

48
New cards

What is used to defend against aLTEr attacks?

Ensure that all LTE network infrastructure components such as base stations and core network equipment have the latest firmware and software updates.

49
New cards

What is used to defend against aLTEr attacks?

Regularly apply patches from network equipment vendors to fix known vulnerabilities.

50
New cards

What is used to defend against aLTEr attacks?

Employ robust encryption methods to protect data transmitted over LTE networks. Use strong encryption algorithms such as AES-256 and ensure that all communications are encrypted end-to-end.

51
New cards

What is used to defend against aLTEr attacks?

Ensure that both the user equipment (UE) and network authenticate each other to prevent unauthorized access. Use mutual authentication mechanisms to verify the identity of both parties in the communication process.

52
New cards

What is used to defend against aLTEr attacks?

Deploy secure SIM cards with enhanced security features to protect against cloning and unauthorized access. Use SIM cards that support advanced security features such as over-the-air (OTA) updates and secure storage.

53
New cards

What is used to defend against aLTEr attacks?

Restrict access to network services based on the geographical location of the user equipment. se location-based access controls to limit access to sensitive network services from unauthorized locations

54
New cards

What is used to defend against aLTEr attacks?

Ensure that physical network infrastructure is secure and protected from tampering. Use physical security measures such as surveillance, access controls, and tamper-evident seals to protect network equipment.

55
New cards

What can be used to detect rogue APs?

RF scanning

56
New cards

What are re‐purposed APs that perform only packet capturing and analysis that are plugged in all over the wired network to detect and warn the WLAN administrator about any wireless devices operating in the area?

RF sensors

57
New cards

What can be used to detect rogue APs?

AP scanning

58
New cards

What are APs that have the functionality of detecting neighboring APs will expose the data through its MIBS and web interface?

AP scanning

59
New cards

What can be used to detect rogue APs?

Wired side inputs

60
New cards

What network management software uses this technique to detect rogue APs. This software detects devices connected in the LAN, including Telnet, SNMP, and Cisco Discovery Protocol (CDP), using multiple protocols?

Wired side inputs

61
New cards

What can be used to detect rogue APs?

Comparison with authorized AP list

62
New cards

What tool can be used to compare the detected APs with a predefined list of authorized APs?

AirMagnet WiFi Analyzer

63
New cards

What can be used to detect rogue APs?

Signal strength analysis

64
New cards

What tool is used for Wi-Fi Planning and Analysis that can help identify unexpected APs based on the signal strength?

Ekahau Survey

65
New cards

What can be used to detect rogue APs?

MAC address filtering

66
New cards

What can you do to block rogue APs?

Deny wireless service to new clients by launching a denial-of-service (DoS) attack on the rogue AP.

67
New cards

What can you do to block rogue APs?

Block the switch port to which the AP is connected or manually locate the AP and physically remove it from the LAN

68
New cards

What can you do to block rogue APs?

Use Wireless intrusion prevention systems (WIPS) to continuously monitor the wireless spectrum for unauthorized devices and perform automated actions to block rogue APs

69
New cards

What can you do to block rogue APs?

Use access control lists (ACLs) to restrict network access to known, authorized MAC addresses.

70
New cards

What can you do to block rogue APs?

Implement 802.1X authentication to control access to the network and ensure that only authenticated users and devices are connected

71
New cards

What can you do to block rogue APs?

Segment the network to isolate critical resources from general wireless access.

72
New cards

What can you do to block rogue APs?

Disable broadcasting of open SSIDs to reduce the risk of unauthorized connections.

73
New cards

What can you do to block rogue APs?

Maintain a whitelist of authorized MAC addresses and configure the wireless controller to block all others.

74
New cards

What configuration defense is best for wireless attacks?

Change the default SSID after WLAN configuration

75
New cards

What configuration defense is best for wireless attacks?

Set the router access password and enable firewall protection

76
New cards

What configuration defense is best for wireless attacks?

Disable SSID broadcasts

77
New cards

What configuration defense is best for wireless attacks?

Disable remote router login and wireless administration

78
New cards

What configuration defense is best for wireless attacks?

Enable MAC Address filtering on your AP or router

79
New cards

What configuration defense is best for wireless attacks?

Enable encryption on your AP and change passphrase often

80
New cards

What SSID defense is best for wireless attacks?

Use SSID cloaking to keep certain default wireless messages from broadcasting the ID to everyone

81
New cards

What SSID defense is best for wireless attacks?

Do not use your SSID, company name, network name, or any easy-to-guess string in passphrases

82
New cards

What SSID defense is best for wireless attacks?

Place a firewall or packet filter between the AP and the corporate Intranet

83
New cards

What SSID defense is best for wireless attacks?

Limit the strength of the wireless network to avoid being detected outside the bounds of your organization

84
New cards

What SSID defense is best for wireless attacks?

Regularly check the wireless devices for configuration or setup problems

85
New cards

What SSID defense is best for wireless attacks?

Implement an additional technique for encrypting traffic, such as IPsec over wireless

86
New cards

What authentication defense is best for wireless attacks?

Enable WPA3 for the highest level of security

87
New cards

What authentication defense is best for wireless attacks?

If WPA3 is not supported by your devices, use WPA2 with AES encryption

88
New cards

What authentication defense is best for wireless attacks?

Use 802.1X authentication with a RADIUS server for enterprise networks

89
New cards

What authentication defense is best for wireless attacks?

Disable the network when not required

90
New cards

What authentication defense is best for wireless attacks?

Place wireless APs in a secure location

91
New cards

What authentication defense is best for wireless attacks?

Keep drivers on all wireless equipment updated

92
New cards

What authentication defense is best for wireless attacks?

Use a centralized server for authentication

93
New cards

What is a network device that monitors the radio spectrum to detect APs (intrusion detection) without the host’s permission in nearby locations? It protect networks against wireless threats and provide administrators the ability to detect and prevent various network attacks.

Wireless Intrusion Prevention System

94
New cards

What security auditing tool offers advanced network security for dedicated monitoring and detection of wireless network anomalies, unauthorized access, and RF attacks?

Cisco Adaptive Wireless IPS

95
New cards

Which of the following is a Wi-Fi security auditing tool?

RFProtect

96
New cards

Which of the following is a Wi-Fi security auditing tool?

Fern Wifi Cracker

97
New cards

Which of the following is a Wi-Fi security auditing tool?

OSWA-Assistant

98
New cards

Which of the following is a Wi-Fi security auditing tool?

BoopSuite

99
New cards

Which of the following is a Wi-Fi security auditing tool?

Wifite

100
New cards

What blocks wireless threats by automatically scanning, detecting, and classifying unauthorized wireless access and rogue traffic to the network, thereby preventing neighboring users or skilled hackers from gaining unauthorized access to the Wi-Fi networking resources?

Wi-Fi IPSs