Hacking Wireless Networks - Wireless Threats

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/83

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

84 Terms

1
New cards

What access control attack can reconfigure a MAC address to appear as an authorized AP to a host on a trusted network? The attacker may use tools such as SMAC to perform this kind of attack.

MAC spoofing

2
New cards

What access control attack can have the entire network be exposed to vulnerabilities and attacks if a user improperly configures any of the critical security settings at any of the APs?

AP misconfiguration

3
New cards

What AP access control attack can allow an attacker to configure APs to broadcast SSIDs to authorized users? All AP models have their own default SSID, and APs with default configurations using default SSIDs are vulnerable to brute-force dictionary attacks. Even if users enable WEP, an unencrypted SSID broadcasts the password in plaintext.

SSID broadcast

4
New cards

What AP access control attack involves network administrators incorrectly using SSIDs as basic passwords to verify authorized users? SSIDs act as rudimentary passwords and help network administrators recognize authorized wireless devices in the network.

Weak password

5
New cards

What AP access control attack includes errors made during installation, configuration policies on an AP, human errors made while troubleshooting WLAN problems, and security changes not implemented uniformly across an architecture?

Configuration error

6
New cards

What AP access control attack does not require an AP to relay packets?

Ad hoc associations

7
New cards

What AP access control attack has an attacker exploit the behavior of 802.11 wireless cards: they always attempt to find a stronger signal to connect? An attacker places an AP near the target Wi-Fi network and gives it a common SSID, offering an irresistibly stronger signal and higher speed than the target Wi-Fi network.

Promiscuous client

8
New cards

What allows an attacker to transmit target network traffic through a fake AP? It is very similar to the evil-twin threat on wireless networks, in which an attacker launches an AP that poses as an authorized AP by beaconing the WLAN's SSID.

Promiscuous client

9
New cards

What AP access control attack may intentionally or accidentally connect or associate with an AP outside the legitimate network because the WLAN signals travel through the air, walls, and other obstructions and leads to access-control attacks?

Client mis-association

10
New cards

What AP access control attack involves an attacker setting up a rogue AP outside the corporation’s perimeter and learns the SSID of the target wireless network? Using a spoofed SSID, the attacker may send beacons advertising the rogue AP in order to lure clients to connect. The attacker can use the rogue AP as a channel to bypass enterprise security policies. Once a client connects to the rogue AP, an attacker can retrieve sensitive information such as usernames and passwords by launching MITM, EAP dictionary, or Metasploit attacks to exploit client mis-association.

Client mis-association

11
New cards

What AP access control attack has two forms: accidental association and malicious association? An attacker performs malicious association with the help of soft APs instead of corporate APs. The attacker creates a soft AP, typically on a laptop, by running a tool that makes the laptop’s NIC appear as a legitimate AP.

Unauthorized association

12
New cards

What involves changing or altering data during transmission? Attackers send forged control, management, or data frames over a wireless network to misdirect wireless devices and perform another type of attack such as a DoS attack

Integrity attacks

13
New cards

What integrity attack constructs and sends forged 802.11 frames?

Data-Frame Injection

14
New cards

What method/tool is used in a data-frame injection attack?

Airpwn-ng and Wperf

15
New cards

What integrity attack constructs and sends forged WEP encryption keys?

WEP Injection

16
New cards

What method/tool is used in a WEP Injection attack?

WEP cracking + injection tools

17
New cards

What integrity attack captures the frame and flipping random bits in the data payload, modifying the ICV, and sending it to the user?

Bit-Flipping Attacks

18
New cards

What integrity attack captures 802.1X Extensible Authentication Protocols (e.g., EAP Identity, Success, and Failure) for later replay?

Extensible AP Replay

19
New cards

What method/tool is used in an Extensible AP Replay?

Wireless capture + injection tools between client and AP

20
New cards

What integrity attack Captures 802.11 data frames for later (modified) replay?

Data Replay

21
New cards

What method/tool is used in a Data Replay attack?

Capture + injection tools

22
New cards

What integrity attack Derives the keystream by sending a plaintext message?

Initialization Vector Replay Attacks

23
New cards

What integrity attack captures RADIUS Access-Accept or Reject messages for later replay?

RADIUS Replay

24
New cards

What method/tool is used in a RADIUS Replay attack?

Ethernet capture + injection tools between AP and authentication server

25
New cards

What integrity attack can provide an attacker with a simple method to compromise APs?

Wireless Network Viruses

26
New cards

What attack attempts to intercept confidential information sent over a wireless network, regardless of whether the system transmits data in cleartext or an encrypted format?

Confidentiality Attack

27
New cards

What confidentiality attack captures and decodes unprotected application traffic to obtain potentially sensitive information.

Eavesdropping

28
New cards

What method/tools is used to perform an eavesdropping attack?

Wireshark, Ettercap, Kismet, commercial analyzers

29
New cards

What confidentiality attack infers information from the observation of external traffic characteristics?

Traffic Analysis

30
New cards

What method/tools is used to perform a traffic analysis attack?

Wireshark, Ettercap, Snort

31
New cards

What confidentiality attack Captures data to recover a WEP key using brute force or Fluhrer-Mantin-Shamir (FMS) cryptanalysis?

Cracking WEP Key

32
New cards

What method/tools is used to perform a cracking WEP key attack?

Aircrack-ng, WEPCrack

33
New cards

What confidentiality attack poses as an authorized AP by beaconing the WLAN's SSID to lure users?

Evil Twin AP

34
New cards

What method/tools is used to perform an Evil Twin AP?

Hostapd, EvilTwinFramework, Wifiphisher

35
New cards

What confidentiality attack sets an AP’s SSID to be the same as that of a legitimate AP?

Honeypot AP

36
New cards

What method/tool is used to perform a Honeypot AP attack?

Manipulating SSID

37
New cards

What confidentiality attack manipulates the network such that the attacker's host appears to be the desired destination?

Session Hijacking

38
New cards

What method/tool is used to perform a session hijacking attack?

Manipulating

39
New cards

What confidentiality attack pretends to be an authorized user to gain access to a system?

Masquerading

40
New cards

What method/tool is used to perform a masquerading attack?

Stealing login IDs and passwords, bypassing authentication mechanisms

41
New cards

What confidentiality attack runs conventional MITM attack tools on an evil-twin AP to intercept TCP sessions or Secure Sockets Layer (SSL)/Secure Shell (SSH) tunnels?

MITM Attack

42
New cards

What method/tool is used to perform a MITM attack?

dsniff, Ettercap, aLTEr attack

43
New cards

What aims at obstructing the delivery of wireless services to legitimate users, either by crippling WLAN resources or by denying them access to these resources?

Availability Attacks

44
New cards

What availability attack physically removes an AP from its installed location?

Access Point Theft

45
New cards

What method/tool is used to perform an access point theft attack?

Stealth and/or speed

46
New cards

What availability attack destroys the connectivity between an AP and client to make the target unavailable to other wireless devices?

Disassociation Attacks

47
New cards

What method/tool is used to perform a Disassociation Attack?

Destruction of connectivity

48
New cards

What availability attack observes a valid 802.1X EAP exchange and then sending the client a forged EAP-Failure message?

EAP-Failure

49
New cards

What method/tool is used to perform an EAP-Failure attack?

Airtool Pi

50
New cards

What availiability attack generates thousands of counterfeit 802.11 beacons to make it difficult for clients to find a legitimate AP?

Beacon Flood

51
New cards

What availability attack exploits the carrier-sense multiple access with collision avoidance (CSMA/CA) clear channel assessment (CCA) mechanism to make a channel appear busy?

Denial-of-Service

52
New cards

What method/tool is used to perform a DoS attack?

An adapter that supports the CW Tx mode, with a low-level utility to invoke continuous transmissions

53
New cards

What availability attack floods client(s) with forged de-authenticates or disassociates to disconnect users from an AP?

De-authenticate Flood

54
New cards

What method/tool is used to perform a De-authenticate Flood attack?

AirJack

55
New cards

What availability attack distributes routing information within the network?

Routing Attacks

56
New cards

What method/tools is used to perform routing attacks?

RIP protocol, exploiting Ad-Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocols using wormhole and sinkhole attacks

57
New cards

What availability attack sends forged authenticates or associates from random MACs to fill a target AP's association table?

Authenticate Flood

58
New cards

What method/tool is used to perform an authenticate attack?

AirJack

59
New cards

What availability attack creates many attack vectors?

Address Resolution Protocol (ARP) Cache Poisoning Attacks

60
New cards

What availability attack transmits a spoofed traffic indication map (TIM) or delivery TIM (DTIM) to a client in the power-saving mode, making the client vulnerable to a DoS attack?

Power Saving Attacks

61
New cards

What availability attack generates invalid TKIP data to exceed the target AP's MIC error threshold, suspending WLAN service?

TKIP MIC Exploit

62
New cards

What attack steals the identity of Wi-Fi clients, their personal information, login credentials, etc. to gain unauthorized access to network resources?

Authentication Attacks

63
New cards

What authentication attack recovers a WPA PSK from captured key handshake frames using a dictionary attack tool?

PSK Cracking

64
New cards

What method/tool is used to perform a PSK (Pre-shared key) cracking attack?

Cowpatty, Fern Wifi Cracker

65
New cards

What authentication attack recovers user credentials from captured 802.1X Lightweight EAP (LEAP) packets using a dictionary attack tool to crack the NT password hash?

LEAP Cracking

66
New cards

What method/tool is used to perform Leap Cracking attacks?

Asleap, THC-LEAPcracker

67
New cards

What authentication attack gains user credentials (e.g., Point-to-Point Tunneling Protocol (PPTP) password or Internet Protocol Security (IPsec) pre-shared secret key) using brute-force attacks on virtual private network (VPN) authentication protocols?

VPN Login Cracking

68
New cards

What method/tool is used to perform a VPN Login Cracking attack?

ike_scan and IKECrack (IPsec), Anger and THC-pptp-bruter (PPTP)

69
New cards

What authentication attack recovers user credentials (e.g., Windows login and password) by cracking NetBIOS password hashes with a brute-force or dictionary-attack tool?

Domain Login Cracking

70
New cards

What method/tool is used to perform a Domain Login Cracking attack?

John the Ripper, L0phtCrack, THC-Hydra

71
New cards

What authentication attack exploits the four-way handshake of the WPA2 protocol?

Key Reinstallation Attack

72
New cards

What method/tool is used to perform a Key Reinstallation Attack?

Nonce reuse technique

73
New cards

What authentication attack captures user identities from cleartext 802.1X Identity Response packets?

Identity Theft

74
New cards

What method/tool is used to perform an Identity Theft attack?

Packet capturing tools

75
New cards

What authentication attack is used to attempt 802.11 shared key authentication with the vendor default or cracked WEP keys?

Shared Key Guessing

76
New cards

What method/tool is used to perform shared key guessing?

WEP cracking tools, Wifite

77
New cards

What authentication attack repeatedly attempts 802.1X authentication using a captured identity to guess the user's password?

Password Speculation

78
New cards

What method/tool is used to perform a Password Speculation attack?

Password dictionary

79
New cards

What authentication attack captures user credentials (e.g., email address and password) from cleartext application protocols?

Application Login Theft

80
New cards

What method/tool is used to perform an Application Login Theft attack?

Ace Password Sniffer, dsniff, Wi-Jacking Attack

81
New cards

What AP attack transmits a stronger beacon signal than legitimate APs so that NICs searching for the strongest available signal may connect to the rogue AP?

Honeypot AP Attack

82
New cards

What attack exploits dynamic routing protocols such as Dynamic Source Routing (DSR) and the Ad-Hoc On-Demand Distance Vector (AODV)? An attacker locates themselves strategically in the target network to sniff and record ongoing wireless transmissions.

Wormhole Attack

83
New cards

What attack is a variant of the selective forwarding attack in which the attacker advertises a compromised or malicious node as the shortest possible route to the base station? The attacker places the malicious node near the base station and attracts all the neighboring nodes with fake routing path information and further performs a data forging attack. Attackers use the compromised node to sniff and manipulate all ongoing network transmissions.

Sinkhole Attack

84
New cards

What attack exploits the underlying vulnerabilities in wireless chips that handle wireless communications such as Bluetooth and Wi-Fi? Attackers leverage combo chips to exploit one chip to steal the data from another chip and make lateral moves to exploit other chips

Inter-Chip Privilege Escalation/Wireless Co-Existence Attack