Wireless Networking
Passive Reconnaissance
Auto Show / Auto Cybersecurity
Networking Essentials
100

The name broadcast by an access point that clients select to join.

SSID

100

Collecting publicly available info about a target without directly interacting with it.

Passive Recon

100

Small wireless device that unlocks/starts a car and is often abused by thieves.

Key Fob

100

Device that forwards packets between different IP networks.

Router

200

Security protocol that replaced WEP and uses AES-CCMP in modern networks.

WPA2

200

DNS record type that reveals a domain’s mail servers.

MX Record

200

In-vehicle network over which ECUs communicate.

CAN Bus

200

Protocol that automatically leases IP addresses to clients.

DHCP

300

IEEE standard commonly called “Wi-Fi 5.”

802.11ac

300

Website that lets you view archived snapshots of web pages over time.

Wayback Machine

300

Standard diagnostic port found under the dash in modern vehicles. (mandated by California starting in the 1996 model year)

OBD-II

300

Default port number most associated with DNS (UDP/TCP).

53

400

Enterprise Wi-Fi security that uses 802.1X and EAP.

WPA-Enterprise

400

Query that reveals domain ownership and registrar details without touching the target’s systems.

whois

400

Attack that forwards and amplifies a key fob’s signal to open a car from afar.

Relay attack

400

Form of NAT that lets many hosts share one public IP by translating ports.

PAT (Port Address Translation)

500

Attack where a fake AP mimics a real one to trick users.

Evil twin attack

500

Public logs you can mine to discover subdomains from issued certificates.

Certificate Transparency logs (e.g., crt.sh)


500

Wireless tire sensors (315/433 MHz) that can leak IDs and pressure data.

TPMS Sensors

500

Layer 4 protocol that is connection-oriented and guarantees reliable delivery.

TCP

M
e
n
u