Define Evil Twin attack (2 methods)
OR
How to protect against Evil Twin attacks
Encrypt communications, such as using a VPN connection when on WiFi networks
Define Rouge Access Point attack
Define Bluesnarfing (2)
Define Bluejacking
Sending unsolicited messages to a mobile device via Bluetooth
Define Wireless Disassociation attack
Denial of Service attack capitalizing on older 802.11 versions taking advantage of unencrypted management frames to forcibly disconnect other clients from the access point
Define Wireless Jamming attack
A Denial of Service attack where the attacker creates additional noise over a WiFi channel to interrupt connectivity
How to detect a jamming attack
Fox-hunt, using a directional antenna to find the source of interference and eliminate it
Define RFID (2 types)
RFID & NFC Vulnerabilities
Define Initialization Vector (IV)
A random value added to an encryption key when encrypting data to strengthen the encryption against being broken
IV Vulnerability and WEP/WPA, aka IV Attack (2)
Define On-Path-Attack (previously known as man-in-the-middle or man-in-the-browser)
Interception and relay of communications without being detected by end devices
2 Examples of On-Path-Attacks
Define ARP Poisoning
Define MAC Flooding
Flooding a switch with spoofed MAC addresses to fill up its MAC address table causing it to function as a hub and broadcast all traffic through every port
How to prevent MAC Flooding attack
Most switches have configuration options to prevent MAC Flooding
Define MAC Address Cloning/Spoofing
Device can impersonate another device by altering its MAC Address to intercept network communications
Define 3 methods to execute a DNS Poisoning Attack
Define Domain Hijacking
Cracking password to gain access to modifying DNS records
Define URL Hijacking
Creating a URL that closely resembles a valid URL to trick users into visiting a malicious site, often due to common typos
Define Domain Reputation attack
If malware infects an email server or web server, the domain may get blacklisted as a source or spam or malicious web site
Define Distributed Denial of Service (DDoS) attack
An attack where many devices (botnet) are used to simultaneously attack a system to affect its availability
What are the 3 primary areas vulnerable to denial of service attacks?