Wireless QOTD April 26th

Discussion in 'Wireless' started by tripwire45, Apr 26, 2004.

?

In a WLAN man-in-the-middle attack, which of the choices below would the attacker need or need to do

  1. A. Set his laptop to simulate a valid AP by emitting the same power level

    0 vote(s)
    0.0%
  2. B. Force users to roam, sometimes by causing them to disassociate from the valid AP with a Bluetooth

    0 vote(s)
    0.0%
  3. C. Continually jam the valid AP with a sweep generator

    0 vote(s)
    0.0%
  4. D. Decrypt the SSID transmitted by the AP during a beacon

    0 vote(s)
    0.0%
  1. tripwire45
    Honorary Member

    tripwire45 Zettabyte Poster

    13,493
    180
    287
    Answer later.
     
    Certifications: A+ and Network+
  2. Phil
    Honorary Member

    Phil Gigabyte Poster

    1,680
    7
    87
    Today I'm going with A.
     
    Certifications: MCSE:M & S MCSA:M CCNA CNA
    WIP: 2003 Upgrade, CCNA Upgrade
  3. mattwest

    mattwest Megabyte Poster

    514
    8
    62
    A seems logically compared to the other options (in theory)
     
    Certifications: See my signature...
    WIP: Maybe re-certify my CCNA
  4. SimonV
    Honorary Member

    SimonV Petabyte Poster Gold Member

    6,651
    180
    258
    I've also gone for A. Good question Trip.
     
    Certifications: MOS Master 2003, CompTIA A+, MCSA:M, MCSE
    WIP: Keeping CF Alive...
  5. tripwire45
    Honorary Member

    tripwire45 Zettabyte Poster

    13,493
    180
    287
    Thanks. It has an even better answer. :wink:
     
    Certifications: A+ and Network+
  6. mattwest

    mattwest Megabyte Poster

    514
    8
    62
    Waiting with baited breath!

    :D
     
    Certifications: See my signature...
    WIP: Maybe re-certify my CCNA
  7. tripwire45
    Honorary Member

    tripwire45 Zettabyte Poster

    13,493
    180
    287
    That comment has "fishing joke" written all over it. :lol:
     
    Certifications: A+ and Network+
  8. AJ

    AJ 01000001 01100100 01101101 01101001 01101110 Administrator

    6,897
    182
    221
    Not a cluse, but just to be different I've gone for D :)
     
    Certifications: MCSE, MCSA (messaging), ITIL Foundation v3
    WIP: Breathing in and out, but not out and in, that's just wrong
  9. mattwest

    mattwest Megabyte Poster

    514
    8
    62
    Yeah i left myself wide open for that one... but just for the record i dont fish!!

    :oops: :!: :D
     
    Certifications: See my signature...
    WIP: Maybe re-certify my CCNA
  10. tripwire45
    Honorary Member

    tripwire45 Zettabyte Poster

    13,493
    180
    287
    If your breath is baited, do you bob for them? :eek: :wink:
     
    Certifications: A+ and Network+
  11. Jakamoko
    Honorary Member

    Jakamoko On the move again ...

    9,924
    74
    229
    Sneaked in a late D before closing
     
    Certifications: MCP, A+, Network+
    WIP: Clarity
  12. tripwire45
    Honorary Member

    tripwire45 Zettabyte Poster

    13,493
    180
    287
    Time's up. Drumroll please. Correct answer is...B. That's right, the hacker would need to do something to make the clients dissociate from the valid AP. The man-in-the-middle attack on a WLAN attempts to get client computers to associate with his/her laptop that's running AP software on it. The hacker has several tasks. They must acquire the SSID for the network but they don't have to decrypt it (D) because it's sent out in beacons in plaintext. The laptop must also transmit at a higher power level than the AP so the clients, after being dissociated from the valid AP, will associate with the hacker's laptop instead of reacquiring the valid AP. The hacker would not want to continually jam the AP because the hacker needs it to connect to the rest of the network and keep the clients connected, too. Sometimes you can force a client to disassociate with their AP by temporarily jamming a part of the WLAN band with a Bluetooth device (which causes narrow band interference).

    This one was a tad more challenging than some I've put up recently. I was beginning to think that there was nothing I could ask in this realm that you couldn't answer. Good job, folks. Let's meet back here tomorrow for another go.
     
    Certifications: A+ and Network+
  13. Jakamoko
    Honorary Member

    Jakamoko On the move again ...

    9,924
    74
    229
    Oh well, no cigar today :(

    Thanks Trip :)
     
    Certifications: MCP, A+, Network+
    WIP: Clarity
  14. AJ

    AJ 01000001 01100100 01101101 01101001 01101110 Administrator

    6,897
    182
    221
    Doh :!: :roll:
     
    Certifications: MCSE, MCSA (messaging), ITIL Foundation v3
    WIP: Breathing in and out, but not out and in, that's just wrong
  15. tripwire45
    Honorary Member

    tripwire45 Zettabyte Poster

    13,493
    180
    287
    I wouldn't be too hard on yourself, AJ. After all, no one got the correct answer. It couldn't have been all that easy.
     
    Certifications: A+ and Network+

Share This Page

Loading...
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.