2.4 Wireless Network Attacks: Deauthentication and RF Jamming Flashcards

(22 cards)

1
Q

What is the primary characteristic of a wireless deauthentication attack from a user’s perspective?

A

Sudden and repeated disconnections from the wireless network without warning messages

Users lose internet access and may struggle to maintain a connection, experiencing drops repeatedly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What specific vulnerability in earlier 802.11 specifications allowed deauthentication attacks to be so effective?

A

Lack of security for management frames

Management frames were sent across the network ‘in the clear’, meaning they were unencrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are management frames sent in the clear in older 802.11 standards a significant security risk?

A

Anyone close to the access point can view the information and manipulate unencrypted frames

Attackers can send malicious commands, such as deauthentication requests, to connected devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Briefly describe the practical steps an attacker would take to perform a deauthentication attack.

A

Use airodump-ng to discover BSSID and victim’s MAC address, then use aireplay-ng with a -0 flag to send deauthentication frames

This specifies both the access point and the victim’s MAC address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How did the IEEE 802.11 committee address the deauthentication vulnerability in newer standards?

A

Incorporated updates in 802.11ac and newer versions that encrypted several management frames

Frames such as disassociate, authenticate, and channel switch announcements are now protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Are all management frames encrypted in 802.11ac and newer standards? Explain why or why not.

A

No, not all management frames are encrypted

Important frames like beacons and probes must remain unencrypted for initial connection processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does an RF jamming attack differ from a deauthentication attack in terms of its target and impact?

A

RF jamming affects everyone trying to communicate over specific frequencies, while deauthentication targets a single device

Deauthentication manipulates management frames; RF jamming disrupts communication broadly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main goal of an RF jamming attack, and how does it achieve this?

A

To decrease the signal-to-noise ratio, making it difficult for devices to distinguish real data

This prevents devices from sending or receiving traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provide two common, non-malicious examples of devices that can cause RF jamming.

A
  • Microwave ovens
  • Fluorescent lights

These can emit signals that disrupt wireless frequencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What technique can be used to locate the source of an RF jamming signal?

A

Fox hunting

This involves using a directional antenna and an attenuator to pinpoint the jammer’s location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the definition of a Deauthentication Attack?

A

A type of Denial-of-Service attack that disconnects a legitimate user from a wireless network by sending spoofed deauthentication frames

It makes it appear as if the access point requested the disconnection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of an Attenuator in RF hunting?

A

To reduce the power or amplitude of a signal without significantly distorting its waveform

This helps locate strong signals by managing signal strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the function of Airodump-ng?

A

To capture raw 802.11 frames for monitoring wireless traffic and identifying connected devices

It is also useful for cracking WEP/WPA keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does BSSID stand for and what does it represent?

A

Basic Service Set Identifier; it is the MAC address of the wireless access point’s radio interface

It uniquely identifies an access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the acronym ESSID stand for?

A

Extended Service Set Identifier

It is the user-friendly name of a wireless network, commonly referred to as the Wi-Fi network name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Radio Frequency (RF) Jamming.

A

A type of Denial-of-Service attack that prevents communication over wireless frequencies by transmitting interfering signals

It aims to decrease the signal-to-noise ratio.

17
Q

What is the significance of Management Frames in 802.11 wireless networks?

A

They are used for maintaining communication between a client and an access point

Examples include authentication, association, and deauthentication frames.

18
Q

What is the role of a Directional Antenna in RF hunting?

A

To radiate or receive electromagnetic waves more effectively in some directions than others

It helps pinpoint the direction of a signal.

19
Q

What is the definition of Denial of Service (DoS)?

A

An attack intended to make a machine or network resource unavailable to its intended users

Typically by temporarily or indefinitely disrupting services of a host connected to the Internet.

20
Q

What is Signal-to-Noise Ratio (SNR)?

A

A measure that compares the level of a desired signal to the level of background noise

A high SNR indicates a clear signal, while a low SNR indicates more noise relative to the signal.

21
Q

What does WLAN0mon represent?

A

A common naming convention for a wireless network interface set into monitor mode

This allows it to capture all wireless traffic in its vicinity.

22
Q

What is the main function of Aireplay-ng?

A

To inject or replay frames into a wireless network

It is commonly used for deauthentication attacks and other wireless security testing.