Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
- 3rd side (hint)
The WNIC equivalent of promiscuous mode in NIC, WNIC can capture pockets |
RF monitor |
|
|
Uses passive scanning to gather information about wireless network for later uses SSID, MAC address, username, sniffing network reconnaissance. |
Passive Attack |
|
|
Listing to each channel for a few packets, and then moves to another channel |
Passive scanning |
|
|
The station sends a probe request frame on each available channel and waits for a probe response frame from an available AP |
Active Scanning |
|
|
Wireless devices installed on a network without authorization or a verified configuation |
Rouge Device |
|
|
An attacker operates between two computers in a network and impersonates one computer to intercept communicaitons |
Man-in-middle-attack |
|
|
An 802.11 authentication method that uses a standard challenge-response process with shared key encryption. It relies on a wireless station having the correct key to encrypt the AP challenge test |
Shared Key encryption |
Uses wep |
|
an 802.11 authentication method that relies on a station having an SSID that matches the network it is attempting to join, a matching SSID is the only criteria for acceptance |
Open system |
|
|
Wireless network that does not uses an AP. One station sends an authentication frame to another and receive a gram indication |
Ad-hoc |
|
|
Uses AP connecting stations, a station transmit it requests to the AP and is authenticated as long as it has the correct SSID |
Infrastructure mode |
|
|
Addresses encryption and authentication, uses 802,1x & AES, symmetric black cipher 256 bits |
802.11i |
|
|
Deny all rules |
Clean up rule |
|
|
Combination of IP address and port numebrs |
Sicker |
|
|
Network Domain, unique identifier of up to 32 characters that server as the wireless network name |
Socket |
|
|
Configuration with multiple BSs networks are connected through a common distribution system. |
ESS |
|
|
Geographical coverage for the BSS |
BSA |
|
|
Single AP |
BSS |
|
|
Wireless network that does not uses a AP. Communicates directly |
IBSS |
|
|
functions as the name of the netowrk |
SSID |
|
|
Sent by a station to another station if the senders wants to terminate the connection
|
Disassociation |
|
|
Sent by a station to another station if the sender wants to terminate the connection |
DeAuthentication |
|
|
First step of the two way handshake sending a data frame |
Request to send (RTS) |
|
|
Gives a station clearance to send. It sends a time valve that keeps all the other stations from transmitting long enough to give the sending station time to transmit |
Clear to send (CTS) |
|
|
After requires data |
ACK |
|
|
Uses certificates from supplicants but does not require certificates from the authentication |
Protected EAP (Peap) |
|
|
Authenticate based on the windows username and password, no encryption needed |
Lightweight eap (leap) |
|
|
Port 20 |
FTP |
|
|
Port 21 |
FTP |
|
|
Port 25 |
SMTP |
|
|
Port 53 |
DNS |
|
|
Port 80 |
HTP |
|
|
Port 443 |
HTTPS |
|
|
Port 445 |
TCP/SMP |
|
|
Port 514 |
Stalin |
|
|
Port 995 |
Pop3 |
|
|
Port 3389 |
Remote Desktop |
|