Enumeration and Computer System Hacking
Wireless Vulnerabilities
Technical and Social Overview
Malware
Sniffers, Session Hijacking and Denial of Service Attacks
100

Involves increasing access on a system

What is Privilege escalation

100

Operates at a 5 GHz

What is 802.11a

100

Web applications are used to do this

What is Allowing dynamic content

100

Designed to intimidate users

What is Scareware

100

Sniffers can be used to do this

What is Capturing information

200

Used to store a password

What is Hash

200

A short-range wireless technology

What is Bluetooth

200

Two scripting languages

What are JavaScript and PHP

200

Used to intercept user informtion

What is Spyware

200

Used to overwhelm a service

What is hijacking

300

Used to reveal passwords

What is a password cracker

300

Dictates the performance of a wireless network

What are clients, interference, AP's

300

Used to audit databases

What is NCC SQuirreL

300

Prevents viruses and malware

What is antivirus software

300

Used to flood a switch with bogus MAC address

What is Spoofing

400

An offline attack

What is a rainbow attack

400

Blocks systems based on physical address

What is MAC filtering

400

Browsers do not display this

What are hidden fields

400

Powerful prevention measure for stopping viruses

What is education

400

A device that can have its memory filled up when MAC flooding is used 

What is a switch

500

An attacker can use this to return to a system

What is a backdoor

500

Several AP's grounded together form a

What is a BSS

500

Can be caused by the exploitation of defects and code

What is SQL injection

500

Methods for transferring data in an uncommon manner

What are covert channels

500

Technique used when a traffic is captured on a network with hubs

What is Passive Sniffing