Wireless Wireless network attacks attempt to take advantage of vulnerabilities in wireless protocols as well as interfere with the wireless network or create false wireless access points to gain entry to a network or steal information. evil twin—An evil twin is an access point (AP) that is created on a wireless network that appears to be legitimate. An evil twin connection will often mimic a legitimate AP using the same SSID but may have a stronger connection, tricking targets into joining the network through the evil twin AP. rogue access point—A rogue access point is an unauthorized AP that shows up when looking for a wireless connection. For example, if you are in a coffee shop and attempt to connect to the shop’s wireless network, you may see numerous available networks that are being broadcast from various devices within the shop, along with the legitimate coffee shop Wi-Fi AP. bluesnarfing—Bluesnarfing is a Bluetooth attack that gains unauthorized access to a device via the Bluetooth connection. Bluesnarfing attacks are intended for the exfiltration of information such as credentials. bluejacking—Bluejacking is a Bluetooth attack that sends unsolicited messages to a target device via a Bluetooth connection. disassociation—Disassociation occurs when a device is disconnected from an AP. Attackers may force disassociation of a target device in order to trick the target into reconnecting via an illegitimate connection, such as a rogue access point. jamming—Jamming is an attack that blocks traffic from communicating in a targeted frequency or range. radio frequency identification (RFID)—RFID is a short-range wireless technology that uses radio frequencies to communicate information between a tag and a reader. An RFID has one-way communication with the reader that pulls information from the tag. Attackers can take advantage of RFID communication by cloning, spoofing, or modifying tags, or they can impersonate RFID readers. near-field communication (NFC)—NFC is a short-range wireless technology, typically four inches in range, that allows for small amounts of information to pass between devices. NFC chips are often used in touchless payment systems. NFC can be vulnerable to spoofing, interception, and replay attacks. initialization Vector (IV)—The IV is a randomly selected value that is used to begin the encryption process. IV attacks aim to decipher the IV used in the encryption process. Only insecure wireless protocols, such as the original wireless security protocol WEP, are currently susceptible to IV attacks. On-Path Attack An on-path attack is an attack that intercepts traffic as it is sent from one host to another. This was formerly known as (and is often still referred to as) a man-in-themiddle attack. Intercepted traffic packets can be altered, delayed, or blocked by the interceptor. Layer 2 Attacks Layer 2 in the OSI model is the data link layer. Layer 2 is responsible for the delivery of frames between network nodes and attacks target frames in transit between network nodes. Local access to the network is required to attack the data link layer. address resolution protocol (ARP) poisoning—ARP poisoning occurs when malicious ARP packets are sent to the default gateway with the intention of changing the MAC/IP address pairings the ARP cache contains. media access control (MAC) flooding—MAC flooding occurs when too many MAC addresses are sent to a switch resulting in full CAM or MAC tables. When a CAM or MAC table is full, the default setting of the switch is to broadcast to all ports on the switch. MAC cloning—MAC cloning is the duplication of a MAC address. A cloned MAC address can be used to access unauthorized networks or communication streams by imitating a trusted MAC address. Domain Name System (DNS) DNS is an internet protocol that allows for the translation of domain names into their corresponding IP address. For example, when you type a URL into a browser, you type its domain name, such as www.google.com. This input is routed through a DNS server that looks up www.google.com and matches it to its IP address (8.8.8.8) to establish a connection. domain hijacking—Domain hijacking changes the registration/ownership of a domain. DNS poisoning—DNS poisoning can occur in two ways, either through an on-path attack or through direct poisoning of the cache. With a DNS on-path poisoning attack, the DNS request is intercepted and redirected to a malicious site. A DNS cache poisoning attack is similar to a MAC poisoning attack in which the cache that contains the DNS files is tainted. Uniform Resource Locator (URL) redirection—URL redirection most commonly occurs when alternate IP addresses for URLs are entered into a system’s host files. domain reputation—Domain reputation is the legitimacy, health, and security of a domain based on information from ISP and email providers. Domain reputation services provide this information on most domains. Distributed Denial-of-Service (DDoS) A DDoS attack is a form of DoS attack that originates from multiple locations, networks, and systems. DDoS attacks are difficult to stop due to their distributed nature and are used to overwhelm or incapacitate a target system. network—A network DDoS attack is the most common type of DDoS attack and is aimed at disrupting an entire target network. Network DDoS attacks are either volume or protocol based. A volume-based DDoS network attack attempts to disrupt the system through the sheer volume of traffic sent to the network at once. Common volume-based attacks are UDP and ICMP floods. A protocol-based DDoS network attack targets the underlying protocols networks use. The most common protocolbased DDoS attack is the SYN flood. application—An application DDoS attack targets the application layer. operational technology (OT)—OT is the software and hardware that is used to control devices and systems in buildings, factories, and other industries. An OT DDoS attack uses the same methods as network and application DDoS attacks but specifically targets OT. OT, for the purposes of the Security+ exam, includes internet of things (IoT) devices. Malicious Code or Script Execution Malicious code is code that can be inserted or used for malicious means. Similar to malware, malicious code is designed to disrupt or intercept communications. Malicious code often uses built-in tools and protocols to leverage a system or network. Test Note: You should be able to differentiate between basic coding samples. PowerShell—PowerShell is the Windows scripting language. One indicator of PowerShell code is the use of the “;” as a separator. PS> $x=”Message1″ ; Write-Host $x Message1 PS> $x=”Message1;Write-Host Busted” ; Write-Host $x Message1;Write-Host Busted Python—Python is a popular coding language with syntax similar to spoken language. Python does not use { } as block delimiters and rarely uses “;”. import whois data = raw_input("Enter a domain: ") w = whois.whois(data) print w Bash—Bash, which stands for Bourne Again Shell, is an interpreter that processes shell commands. progressBarWidth=20 # Function to draw progress bar progressBar () { # Calculate number of fill/empty slots in the bar progress=$(echo "$progressBarWidth/$taskCount*$tasksDone" | bc -l) macros—Macros are abbreviations of complicated inputs to a computer program and can be used to reuse code. Macros can be tainted with malicious code and must be used carefully. Visual Basic for Applications (VBA)—VBA is an event-driven scripting language mainly used by Microsoft for their office applications. Sub Macro1() ' ' Macro1 Macro ' ' Range("B1").Select ' ActiveCell.FormulaR1C1 = "Hello World" ' Range("B2").Select End Sub