• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)

The WNIC equivalent of promiscuous mode in NIC, WNIC can capture pockets

RF monitor

Uses passive scanning to gather information about wireless network for later uses SSID, MAC address, username, sniffing network reconnaissance.

Passive Attack

Listing to each channel for a few packets, and then moves to another channel

Passive scanning

The station sends a probe request frame on each available channel and waits for a probe response frame from an available AP

Active Scanning

Wireless devices installed on a network without authorization or a verified configuation

Rouge Device

An attacker operates between two computers in a network and impersonates one computer to intercept communicaitons

Man-in-middle-attack

An 802.11 authentication method that uses a standard challenge-response process with shared key encryption. It relies on a wireless station having the correct key to encrypt the AP challenge test

Shared Key encryption

Uses wep

an 802.11 authentication method that relies on a station having an SSID that matches the network it is attempting to join, a matching SSID is the only criteria for acceptance

Open system

Wireless network that does not uses an AP. One station sends an authentication frame to another and receive a gram indication

Ad-hoc

Uses AP connecting stations, a station transmit it requests to the AP and is authenticated as long as it has the correct SSID

Infrastructure mode

Addresses encryption and authentication, uses 802,1x & AES, symmetric black cipher 256 bits

802.11i

Deny all rules

Clean up rule

Combination of IP address and port numebrs

Sicker

Network Domain, unique identifier of up to 32 characters that server as the wireless network name

Socket

Configuration with multiple BSs networks are connected through a common distribution system.

ESS

Geographical coverage for the BSS

BSA

Single AP

BSS

Wireless network that does not uses a AP. Communicates directly

IBSS

functions as the name of the netowrk

SSID

Sent by a station to another station if the senders wants to terminate the connection


Disassociation

Sent by a station to another station if the sender wants to terminate the connection

DeAuthentication

First step of the two way handshake sending a data frame

Request to send (RTS)

Gives a station clearance to send. It sends a time valve that keeps all the other stations from transmitting long enough to give the sending station time to transmit

Clear to send (CTS)

After requires data

ACK

Uses certificates from supplicants but does not require certificates from the authentication

Protected EAP (Peap)

Authenticate based on the windows username and password, no encryption needed

Lightweight eap (leap)

Port 20

FTP

Port 21

FTP

Port 25

SMTP

Port 53

DNS

Port 80

HTP

Port 443

HTTPS

Port 445

TCP/SMP

Port 514

Stalin

Port 995

Pop3

Port 3389

Remote Desktop