Gimme the Creds
Like Oreos, but not
What wires?
802.3 and Me
If all you have is a hammer...
100

In this offline attack, the attacker uses a pre-computed database of values to check against a list of password hashes

What is a Rainbow Table attack?

100

This method of obtaining MITM involves sending gratuitous ARP packets to both the victim and its default gateway

What is ARP poisoning

100

In this wireless attack method, the attacker uses a wireless sniffer you capture traffic that is already in transit

What is eavesdropping?

100

The attacker can masquerade as a victim by stealing their 48-bit address

What is MAC address spoofing?

100

This tool "is a complete suite of tools to assess WiFi network security." It allows for replay and de-authentication attacks and offers the ability to crack WPA PSK

What is Aircrack-NG

200

This attack uses a stored version of a password in order to initiate a new session, usually on a different machine within the same network (as a means of lateral movement). Not cracking required.

What is pass the hash?

200

This form of gaining MITM involves a malicious actor setting up an access point that mimics the target access point with a similar SSID to fool the victim into joining the malicious access point

What is Rogue Access Point (also known as Evil Twin)

200

In this wireless attack method, the attacker sends a spoofed packet to the access point in order to force legitimate users to disconnect

What is a De-authentication attack?

200

The attacker pretends to be a network device with trunking capability in order to read data from multiple virtualized networks

What is switch spoofing? (this is also a form of VLAN hopping)

200

This type of attack is carried out by tools such as HULK, LOIC, and SlowLoris.

What is DoS?

300

In this online attack, the attacker uses only a few common password but tries the same password against multiple users or servers

What is password spraying?

300

This method of gaining MITM involves compromising the target DNS server and replacing a legitimate resolution with a malicious one that redirects the victim to a server under control of the attacker

What is DNS spoofing

300

In this wireless attack method, the attacker transmits a strong signal tuned to the frequency of the intended receiver to prevent that victim from creating a connection

What is jamming?

300

The attacker sends a high volume of spoofed addresses to the switch to fill the table that maps addresses to ports, effectively turning the switch into a hub.

What is CAM table flooding?

300

This tool is a network detector, packet sniffer, and intrusion detection system for 802.11 networks.

What is Kismet?

400

The attacker takes advantage of the Windows challenge-response mechanism by intercepting a legitimate authentication request and then forwarding that to the server. The attacker must also intercept the response from the victim and forwards that as well.

What is a NTLM relay attack?

400

This method of obtaining MITM involves an attacker using social engineering to obtain the email credentials of a victim and then silently monitoring the victim's email until an opportunity arises to take advantage of the victim

What is email hijacking

400

The attacker targets a 802.15-enabled device without the user's knowledge to steal data

What is Bluesnarfing?

400

The attacker exploits vulnerabilities in the system that detects initial connections and prevents unauthorized users from accessing the network in order to gain access

What is NAC bypass?

400

This tool will allow you to set up Evil Twin attacks in an automated way, can perform captive portal attacks, and specifically targets WPA2 Enterprise networks.

What is EAPHammer?

500

this technique follows a 4-step process:

1. Scan Active Directory for user accounts with Service Principal Name (SPN) set

2. Request a service ticket using the SPN

3. Extract the service ticket from memory (using something like Mimikatz)

4. Conduct an offline attack against the passwords in the service ticket

What is Kerberoasting?

500

In this means of obtaining MITM, the attacker enacts a DOS on the valid DHCP server and then sets up a malicious DHCP server which tells victims that the attacker is the actual default gateway

What is DHCP spoofing

500

Taking advantage of this "dumb" technology's propensity to communicate without authentication, an attacker can steal data from a short distance away and copy it over to a blank card, thus giving them unauthorized access

What is RFID cloning?

500

The attacker adds malicious routes into a routing table by posing as a legitimate routing process and takes advantage of the lack of authentication on forming neighborships.

What is route injection or route poisoning?

500

This physical tool, developed by Hak5, was intended to enable wireless pen testing and to help administrators audit wireless network security. It can act as an Evil Twin and conduct MITM attacks, remaining transparent to the end user.

What is a Wi-Fi Pineapple?