What is the primary characteristic of a wireless deauthentication attack from a user’s perspective?
Sudden and repeated disconnections from the wireless network without warning messages
Users lose internet access and may struggle to maintain a connection, experiencing drops repeatedly.
What specific vulnerability in earlier 802.11 specifications allowed deauthentication attacks to be so effective?
Lack of security for management frames
Management frames were sent across the network ‘in the clear’, meaning they were unencrypted.
Why are management frames sent in the clear in older 802.11 standards a significant security risk?
Anyone close to the access point can view the information and manipulate unencrypted frames
Attackers can send malicious commands, such as deauthentication requests, to connected devices.
Briefly describe the practical steps an attacker would take to perform a deauthentication attack.
Use airodump-ng to discover BSSID and victim’s MAC address, then use aireplay-ng with a -0 flag to send deauthentication frames
This specifies both the access point and the victim’s MAC address.
How did the IEEE 802.11 committee address the deauthentication vulnerability in newer standards?
Incorporated updates in 802.11ac and newer versions that encrypted several management frames
Frames such as disassociate, authenticate, and channel switch announcements are now protected.
Are all management frames encrypted in 802.11ac and newer standards? Explain why or why not.
No, not all management frames are encrypted
Important frames like beacons and probes must remain unencrypted for initial connection processes.
How does an RF jamming attack differ from a deauthentication attack in terms of its target and impact?
RF jamming affects everyone trying to communicate over specific frequencies, while deauthentication targets a single device
Deauthentication manipulates management frames; RF jamming disrupts communication broadly.
What is the main goal of an RF jamming attack, and how does it achieve this?
To decrease the signal-to-noise ratio, making it difficult for devices to distinguish real data
This prevents devices from sending or receiving traffic.
Provide two common, non-malicious examples of devices that can cause RF jamming.
These can emit signals that disrupt wireless frequencies.
What technique can be used to locate the source of an RF jamming signal?
Fox hunting
This involves using a directional antenna and an attenuator to pinpoint the jammer’s location.
What is the definition of a Deauthentication Attack?
A type of Denial-of-Service attack that disconnects a legitimate user from a wireless network by sending spoofed deauthentication frames
It makes it appear as if the access point requested the disconnection.
What is the purpose of an Attenuator in RF hunting?
To reduce the power or amplitude of a signal without significantly distorting its waveform
This helps locate strong signals by managing signal strength.
What is the function of Airodump-ng?
To capture raw 802.11 frames for monitoring wireless traffic and identifying connected devices
It is also useful for cracking WEP/WPA keys.
What does BSSID stand for and what does it represent?
Basic Service Set Identifier; it is the MAC address of the wireless access point’s radio interface
It uniquely identifies an access point.
What does the acronym ESSID stand for?
Extended Service Set Identifier
It is the user-friendly name of a wireless network, commonly referred to as the Wi-Fi network name.
Define Radio Frequency (RF) Jamming.
A type of Denial-of-Service attack that prevents communication over wireless frequencies by transmitting interfering signals
It aims to decrease the signal-to-noise ratio.
What is the significance of Management Frames in 802.11 wireless networks?
They are used for maintaining communication between a client and an access point
Examples include authentication, association, and deauthentication frames.
What is the role of a Directional Antenna in RF hunting?
To radiate or receive electromagnetic waves more effectively in some directions than others
It helps pinpoint the direction of a signal.
What is the definition of Denial of Service (DoS)?
An attack intended to make a machine or network resource unavailable to its intended users
Typically by temporarily or indefinitely disrupting services of a host connected to the Internet.
What is Signal-to-Noise Ratio (SNR)?
A measure that compares the level of a desired signal to the level of background noise
A high SNR indicates a clear signal, while a low SNR indicates more noise relative to the signal.
What does WLAN0mon represent?
A common naming convention for a wireless network interface set into monitor mode
This allows it to capture all wireless traffic in its vicinity.
What is the main function of Aireplay-ng?
To inject or replay frames into a wireless network
It is commonly used for deauthentication attacks and other wireless security testing.