A malicious user is sniffing a busy encrypted wireless network waiting for an authorized client to
connect to it. Only after an authorized client has connected and the hacker was able to capture the
client handshake with the AP can the hacker begin a brute force attack to discover the encryption
key. Which of the following attacks is taking place?
A.
IV attack
B.
WEP cracking
C.
WPA cracking
D.
Rogue AP
One of those vaguely constructed questions.
In here, the Hacker:
• Is sniffing a busy encrypted wireless network
• Waiting for an authorized client to connect to it
• In an attempt to capture the client handshake
• With the AP “Access Point”
Process of elimination:
A- IV Atack – An initialization vector (IV) attack is an attack on wireless networks. It modifies the IV of an encrypted wireless packet during transmission. Once an attacker learns the plaintext of one packet, the attacker can compute the RC4 key stream generated by the IV used.
D- Rogue AP- There is no indication in here that the attacker is using a “Rogue Access Point” hence D is eliminated from the onset
So the answer is a tossup between B and C.
It could be either of them, as both WEP and WPA provide encryption .
Having said that: WiFi Protected Access (WPA) is the most secure and is the replacement for WEP, so we shall assume in here that the company is using WPA as opposed to WEP
Thus the only possible and reasonable answer is “C- WPA cracking”
0
0