Untitled Deck Flashcards

(58 cards)

1
Q

What is fuzzing?

A

Fuzzing is the process of feeding an implementation with large amounts of unexpected, malformed or random input to identify parsing bugs, crashes or logic flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In Wi-Fi fuzzing, what is typically used as input instead of a string in a file?

A

In Wi-Fi the input isn’t a string in a file, it’s mostly 802.11 frames, including the management frames, control frames and data frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are typical targets of 802.11 fuzzing?

A

Targets of 802.11 fuzzing are wireless drivers, AP firmware, and wireless supplicants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the goal of fuzzing 802.11 implementations?

A

The goal of fuzzing is to find conditions where the implementation causes crashes, reboots, enters a denial of service state, or misparses frames.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does an attacker practically carry out 802.11 fuzzing?

A

An attacker will generate malformed 802.11 frames and transmit them over the air toward the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some 802.11 fields that can be fuzzed.

A

Fields that can be fuzzed include the SSID IE, RSN, IE lengths and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bluetooth described as in the document?

A

Bluetooth is a short-range wireless technology which comes in two main flavours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two main flavours of Bluetooth?

A

The two main flavours of Bluetooth are Bluetooth Classic (BR/EDR) and Bluetooth Low Energy (BLE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Bluetooth Classic (BR/EDR) mainly used for?

A

Bluetooth Classic (BR/EDR) is higher throughput, used for audio such as headsets and speakers, HID and similar uses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Bluetooth Low Energy (BLE) mainly used for?

A

Bluetooth Low Energy (BLE) is optimised for low power and is used by wearables, beacons and IoT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Classic pairing authentication vulnerable to?

A

Classic pairing authentication is vulnerable to an offline PIN attack, where an attacker is able to eavesdrop on the initial pairing exchange to capture the plaintext inputs which can be used to guess the PIN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is said about Bluetooth authentication during initial pairing?

A

Bluetooth authentication is weak during initial pairing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can be done regarding non-discoverable Bluetooth devices?

A

It is possible to identify non-discoverable devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is BTCrack?

A

BTCrack is a Bluetooth PIN cracking tool written for Windows that accepts the input algorithm values in the GUI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one recommendation if Bluetooth is unnecessary?

A

If Bluetooth is not needed, disable the feature and do not rely on marking devices as not-discoverable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why make Bluetooth devices non-discoverable?

A

While not a foolproof security mechanism, making a Bluetooth device non-discoverable can significantly help in securing Bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What should be done with unneeded Bluetooth profiles?

A

Unneeded Bluetooth profiles should be disabled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can software maintenance help against Bluetooth attacks?

A

Maintaining software versions whenever possible helps to mitigate known threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In what types of devices does BLE have wide-ranging adoption?

A

BLE has a wide-ranging adoption, from medical devices, fitness trackers, physical security systems and others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why can Classic Bluetooth be too costly to implement in some devices?

A

Classic Bluetooth can be too costly to implement due to a complex stack and massive power draw.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What kinds of devices are best suited for BLE?

A

Devices where BLE excels are often low power and short on RAM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What was a key design goal in BLE regarding power and data transfers?

A

A key design goal in BLE was low-power support for modest data transfers over five years with a single coin battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does BLE support its low-power design goal?

A

BLE uses very aggressive power conservation in order to support its design goal of modest data transfers over five years with a single coin battery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Why does BLE see strong adoption compared to some other protocols?

A

BLE sees adoption due to more brand recognition; other protocols that offer short, bursty data transfers such as ZigBee and Near-Field Communication do not have the same adoption.

25
How does BLE compare in implementation cost to ZigBee?
BLE costs about $1 to implement per radio endpoint, while ZigBee was intended to be inexpensive at $5 per radio implementation, and BLE undercut this.
26
What is one way BLE changes security related to devices in the environment?
It is easy to find advertising devices, and once found it is easy to follow conversation and traffic capture to PIN bruteforce.
27
What is said about BLE channel hopping from a security perspective?
BLE channel hopping is easy to discover.
28
How does BLE advertising behaviour help an attacker follow a conversation?
BLE advertises on only three channels; if traffic is observed there, one can guess the next channel and then follow the entire conversation and obtain information to get PINs for paired devices by bruteforce.
29
What is noted about many BLE profiles compared to Classic Mode 1 profiles?
Many profiles may appear to be similar to Classic’s Mode 1 profiles, requiring no authentication or encryption to exchange data.
30
What is generally required to test, inspect and audit BLE data in transit?
Methods to test, inspect and audit Bluetooth Low Energy data in transit require hardware and software to interact at multiple layers of the stack.
31
What is the Ellisys Bluetooth Explorer?
Ellisys Bluetooth Explorer is a multi-purpose, wide-band SDR used for the 2.4 GHz RF including Bluetooth Classic/EDR, BLE, Wi-Fi and others.
32
What software does Ellisys produce for use with the Bluetooth Explorer, and what can it do?
Ellisys produces its own software, SmartRF, for use with the Bluetooth Explorer, and SmartRF is capable of recovering BLE artifacts and includes sniffing HCI layer interaction, capturing data and performing traffic analysis.
33
Approximately how much does the Ellisys Bluetooth Explorer solution cost?
The Ellisys Bluetooth Explorer and software solution costs $30,000.
34
What is the NRF 51822 used for in the context of BLE?
The NRF 51822 was developed into a USB dongle for use as a BLE development platform and a sniffer for troubleshooting.
35
What does HCI snooping observe?
HCI snooping observes HCI layer commands to and from BLE devices.
36
How is HCI snooping defined in the document?
HCI snooping is the process of recording the commands that are sent to and from the local HCI layer, destined for and received from the Bluetooth adapter.
37
Why is HCI snooping not considered promiscuous?
Because HCI snooping uses only a local sniffer, it does not follow other devices nor act in promiscuous mode.
38
Which platforms are noted as supporting HCI snooping?
HCI snooping supports both Android and Linux.
39
What tool can be used for HCI snooping on Linux?
HCI snooping can be performed on Linux with btmon.
40
What is Ubertooth One?
Ubertooth One is a custom built Bluetooth adapter designed to break the HCI layer abstraction present with standard Bluetooth adapters.
41
What capabilities does Ubertooth One provide for BLE traffic?
Ubertooth One allows for sniffing BLE traffic and BLE traffic injection and interacting with BLE devices with custom applications.
42
What does hcitool allow an assessor to do?
hcitool allows scanning for advertising devices and the associated device friendly name.
43
What does gatttool allow an assessor to do?
gatttool can be used to interact with the profiles and attach to a specific device to connect to.
44
Why is Classic Bluetooth PIN or passcode cracking considered daunting?
With Classic Bluetooth, capturing the pairing exchange and gathering enough data to crack PINs is fairly daunting, and you need to determine the hopping pattern and other details.
45
How does BLE PIN cracking compare to Classic Bluetooth PIN cracking?
With BLE PIN cracking, these challenges are quite easy to overcome.
46
What makes BLE PIN cracking become quite trivial according to the document?
BLE PIN cracking becomes quite trivial with constant advertisements announcing presence on one of three channels and an easily observable next hop with 11 possible guesses.
47
How can Ubertooth One assist in BLE PIN or passcode cracking?
Ubertooth One can discover advertising BLE devices, follow their channel hopping and recover the exchange, saving the data, and if we are lucky we might capture pairing or bonding exchanges that we can use to bruteforce.
48
What is BLE fuzzing?
BLE fuzzing refers to using automated tools to send broken BLE messages to a device to uncover implementation bugs and security vulnerabilities.
49
What is a BLE replay attack in general terms?
A BLE replay attack is where, if one could capture and replay a single BLE command that performed an action against a device, one could perform the same command repeatedly.
50
What is the effect of a BLE replay attack on a device?
A BLE replay would effectively cause the device to perform the same potentially kinetic action at every replay.
51
Give an example of a BLE replay attack from the document.
One example given is the capture and replay of an unlock command for a door lock; multiple replays could keep the door unlocked, even after the transmission of a lock command.
52
What popular tool is mentioned as an example use case for BLE replay?
A popular use case of the Flipper Zero is mentioned as an example of BLE replay.
53
What does BLE MITM allow an attacker to do?
BLE MITM allows for the modification of requests in transit, although it has a high barrier to entry.
54
What is required to perform a BLE MITM attack as described in the document?
If a connection from the client device (victim) to a master can be proxied, an attacker can modify values in transit.
55
What tool is named as being used for BLE MITM?
BTLEjuice is named as the tool used for BLE MITM.
56
How is an SDR defined in the context of Practical SDR Attacks?
An SDR, or Software Defined Radio, is a radio where most of the radio processing is done in software instead of fixed hardware.
57
What does SDR allow developers to do instead of building modulation mechanisms in hardware?
Instead of developing modulation mechanisms in hardware, developers can write software to process and interpret signals received from the RF spectrum.
58
What assumption does SDR technology avoid making about user intent?
SDR technology does not make any assumptions as to how the user wishes to interpret the spectrum for receive or transmit paths.