WLAN Security Protocols: WEP, WPA, WPA2, and WPA3

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Welche Aussage beschreibt am besten die Sicherheitsmerkmale von WEP im Vergleich zu neueren WLAN-Sicherheitsprotokollen?

  • WEP verwendet einen dynamischen Schlüssel, der es sicherer als WPA macht.
  • WEP bietet ein hohes Maß an Sicherheit durch die Verwendung des Advanced Encryption Standard (AES).
  • WEP ist der derzeit sicherste Standard für WLANs.
  • WEP ist unsicher und für moderne Netzwerke ungeeignet, da es leicht zu knacken ist. (correct)

Was ist ein wesentlicher Vorteil von WPA2 gegenüber WPA hinsichtlich der WLAN-Sicherheit?

  • WPA2 ist anfälliger für Brute-Force-Angriffe als WPA.
  • WPA2 unterstützt ausschließlich die Kompatibilität mit älteren Geräten.
  • WPA2 verwendet den Temporal Key Integrity Protocol (TKIP).
  • WPA2 bietet ein hohes Maß an Sicherheit durch die Verwendung des Advanced Encryption Standard (AES). (correct)

Welche Funktion erfüllt WPS (Wi-Fi Protected Setup) und welches Risiko birgt es?

  • WPS ermöglicht die automatische Verbindung von Geräten mit dem Netzwerk durch Drücken einer Taste oder Eingabe einer PIN, birgt aber Sicherheitsrisiken, besonders bei der PIN-Option. (correct)
  • WPS ist sicherer gegen Brute-Force-Angriffe.
  • WPS ermöglicht eine manuelle Konfiguration des Netzwerks und erhöht dadurch die Sicherheit.
  • WPS dient der kontinuierlichen Erneuerung des Schlüssels und bietet somit verbesserten Schutz vor Angriffen.

Welche Schutzmaßnahme wird empfohlen, um das Risiko von Angriffen auf WLAN-Netzwerke zu minimieren?

<p>Die Nutzung von WPA2 oder WPA3 in Kombination mit einem starken Passwort und die Deaktivierung von WPS. (B)</p> Signup and view all the answers

Was ist das Hauptziel eines ARP-Spoofing-Angriffs?

<p>Den Datenverkehr zwischen Router und Opfer über den Angreifer zu leiten, indem falsche MAC-Adressen verbreitet werden. (A)</p> Signup and view all the answers

Wie funktioniert ein DNS-Spoofing-Angriff?

<p>Durch Manipulation der DNS-Anfragen des Opfers, um es auf gefälschte Webseiten umzuleiten. (D)</p> Signup and view all the answers

Welche Funktion hat eine Firewall in Bezug auf den Netzwerkverkehr?

<p>Eine Firewall blockiert oder erlaubt Verkehr basierend auf vordefinierten Regeln. (B)</p> Signup and view all the answers

Was ist der Unterschied zwischen einem Intrusion Detection System (IDS) und einem Intrusion Prevention System (IPS)?

<p>Ein IDS erkennt und meldet verdächtige Aktivitäten, ohne einzugreifen, während ein IPS verdächtige Aktivitäten aktiv erkennt und blockiert. (C)</p> Signup and view all the answers

Warum ist ein gültiges Zertifikat für eine HTTPS-Seite wichtig?

<p>Es bestätigt, dass man dem Server vertrauen kann und dass der öffentliche Schlüssel zu der wirklichen Seite gehört. (D)</p> Signup and view all the answers

Was bedeutet der Begriff "Living off the Land" im Kontext von Cyberangriffen?

<p>Der Angreifer nutzt vorhandene Programme und Skripte des Zielsystems, anstatt eigene Tools zu verwenden. (C)</p> Signup and view all the answers

Welchen Vorteil bietet IPv6 im Vergleich zu IPv4 hinsichtlich der Erreichbarkeit von Geräten aus dem Internet?

<p>IPv6 ermöglicht theoretisch, dass alle Geräte eine öffentliche, eindeutige IP-Adresse haben und direkt aus dem Internet erreichbar sind, ohne NAT. (A)</p> Signup and view all the answers

Was ist das grundlegende Prinzip von Zero Trust?

<p>Vertrauen wird nur auf der Basis von kontinuierlicher Überprüfung und Authentifizierung gewährt, unabhängig davon, ob sich der Benutzer innerhalb oder außerhalb des Netzwerks befindet. (D)</p> Signup and view all the answers

Welche der folgenden Optionen bietet die sicherste Möglichkeit, im Internet anonym zu bleiben?

<p>Die Verwendung des Tor-Browsers allein. (B)</p> Signup and view all the answers

Was ist das Ziel von Asymmetrischer Verschlüsselung?

<p>Die Verwendung eines Paares aus öffentlichem und privatem Schlüssel, wobei der öffentliche Schlüssel zum Verschlüsseln und der private Schlüssel zum Entschlüsseln verwendet wird. (B)</p> Signup and view all the answers

Wie funktioniert der Diffie-Hellman-Schlüsselaustausch?

<p>Beide Parteien erstellen gemeinsam einen symmetrischen Schlüssel über einen unsicheren Kanal, ohne den Schlüssel selbst zu übertragen. (D)</p> Signup and view all the answers

Was ist der Zweck von RSA in Bezug auf die Serverauthentifizierung?

<p>Um sicherzustellen, dass der Server echt ist (Authentifizierung). (D)</p> Signup and view all the answers

Was ist der Unterschied zwischen symmetrischen und asymmetrischen Schlüsseln im Bezug auf Signaturen und MAC?

<p>Signaturen verwenden asymmetrische Schlüssel, während MAC symmetrische Schlüssel verwenden. (C)</p> Signup and view all the answers

Was ist das Hauptziel bei der Nutzung eines VPN in einem Unternehmen?

<p>Die Ermöglichung eines sicheren Zugriffs auf interne Unternehmensressourcen, sowohl vor Ort als auch remote. (C)</p> Signup and view all the answers

Welche Funktion hat ein Domänencontroller in einem Netzwerk?

<p>Er verwaltet die Authentifizierung und Autorisierung von Benutzern und Computern in einem Netzwerk. (D)</p> Signup and view all the answers

Was ist User-Agent-Spoofing und zu welchem Zweck wird es eingesetzt?

<p>Die Änderung des User-Agent-Strings, den der Browser sendet, um ein anderes Gerät, einen anderen Browser oder ein anderes Betriebssystem vorzutäuschen. (C)</p> Signup and view all the answers

Welchen Zweck hat der Befehl netdiscover -r 10.0.2.1/24?

<p>Er zeigt alle IP-Adressen im Bereich von 10.0.2.1 bis 10.0.2.254 an. (B)</p> Signup and view all the answers

Was ermöglicht der Befehl echo 1 > /proc/sys/net/ipv4/ip_forward im Kontext der Netzwerkkonfiguration?

<p>Er schaltet die Weiterleitung von Paketen ein, sodass diese auch weitergegeben werden können. (D)</p> Signup and view all the answers

Welche grundlegende Funktion bietet das Tool Bettercap im Bereich der Netzwerkanalyse und -manipulation?

<p>Es bietet ein Webinterface zur Ausführung verschiedener Netzwerkangriffe und Analysen. (D)</p> Signup and view all the answers

Was ist das Hauptziel eines ARP-Spoofing-Angriffs in Verbindung mit Bettercap?

<p>Das Umleiten des Datenverkehrs, um ihn abzufangen und zu analysieren. (D)</p> Signup and view all the answers

Was bewirkt ein DNS-Spoofing-Angriff?

<p>Er leitet DNS-Anfragen auf gefälschte Server um, um Benutzer auf schädliche Webseiten zu lotsen. (D)</p> Signup and view all the answers

Was ist ein Fake Access Point?

<p>Ein von einem Angreifer erstellter WLAN-Hotspot, der legitime Router nachahmt, um Benutzerdaten abzufangen. (D)</p> Signup and view all the answers

Was ermöglicht das Tool Msfvenom?

<p>Das Erstellen von Backdoors und Exploits. (B)</p> Signup and view all the answers

Was ist das Hauptziel von Metasploit?

<p>Das Ausnutzen von Sicherheitslücken, um in ein System einzudringen. (A)</p> Signup and view all the answers

Was ermöglicht der Befehl Set PAYLOAD windows/meterpreter/reverse_https in Metasploit?

<p>Er wählt den Payload für die Reverse-Verbindung über HTTPS aus. (D)</p> Signup and view all the answers

Was ist Autoit und wozu dient es typischerweise im Kontext von Cyberangriffen?

<p>Eine Programmiersprache zur Automatisierung von Aufgaben, die zur Erstellung von Malware oder zur Automatisierung von Angriffen verwendet werden kann. (D)</p> Signup and view all the answers

Was ist Beef (Browser Exploitation Framework)?

<p>Ein Framework, das es ermöglicht, Webbrowser zu infizieren und für Angriffe zu nutzen. (B)</p> Signup and view all the answers

Was ist das Ziel eines XSS-Angriffs (Cross-Site Scripting)?

<p>Schadcode in Webseiten einzuschleusen, um clientseitige Aktionen auszuführen. (C)</p> Signup and view all the answers

Was ermöglicht das Tool Weevly?

<p>Das Generieren von Shellcode, um es hochzuladen und auszuführen. (B)</p> Signup and view all the answers

Was erlauben CVE-Nummern im Bereich der Cybersicherheit?

<p>Die eindeutige Identifizierung und das Sprechen über spezifische Sicherheitsanfälligkeiten. (C)</p> Signup and view all the answers

Welche Funktion hat das OCSP (Online Certificate Status Protocol)?

<p>Es ist ein Protokoll, das den Gültigkeitsstatus eines Zertifikats in Echtzeit überprüft. (A)</p> Signup and view all the answers

Was ist das Ziel eines Prompt-Injection-Angriffs?

<p>Die Manipulation von KI-Modellen durch gezielte Eingaben. (C)</p> Signup and view all the answers

Welche Aufgabe hat ein Sicherheitsdienst wie CrowdStrike?

<p>Die Überwachung von Clients auf schädliche Aktivitäten und Weiterleitung dieser an das Unternehmen. (D)</p> Signup and view all the answers

Was ist die Hauptfunktion von BIOS?

<p>Die Bereitstellung der grundlegenden Funktionen des Computers beim Starten. (B)</p> Signup and view all the answers

Was ist Tailscale?

<p>Eine Art Overlay-Netzwerk, das die Vermittlung übernimmt und Datenverbindungen verschlüsselt. (A)</p> Signup and view all the answers

Was ist der Zweck eines DNS-over-HTTPS (DoH) Servers?

<p>Um DNS-Anfragen zu verschlüsseln, wodurch sie sicherer und privater werden. (D)</p> Signup and view all the answers

Was ist der Unterschied zwischen SmartDNS und VPN?

<p>SmartDNS ändert nur die DNS-Auflösung, während VPN den gesamten Datenverkehr tunnelt und verschlüsselt. (D)</p> Signup and view all the answers

Flashcards

WEP (Wired Equivalent Privacy)

The original security standard for WLANs, insecure and easy to crack, using a weak 40-bit key, outdated and unsuitable for modern networks.

WPA (Wi-Fi Protected Access)

An advancement over WEP, uses Temporal Key Integrity Protocol (TKIP), dynamic keys, more secure than WEP but outdated with some security gaps.

WPA2 (Wi-Fi Protected Access 2)

Further development of WPA, uses Advanced Encryption Standard (AES), offers a high degree of security, widely used standard for WLANs.

WPA3 (Wi-Fi Protected Access 3)

The latest security standard, uses Simultaneous Authentication of Equals (SAE), secure against brute-force attacks, currently the most secure standard for WLANs.

Signup and view all the flashcards

WPS (Wi-Fi Protected Setup)

Enables automatic connection of devices to the network, connection by pressing a button or entering a PIN, convenient but with security risks, especially with PIN option.

Signup and view all the flashcards

WEP Hacking

A type of attack that intercepts all network traffic, exploiting WEP's weak 40-bit keys which are easily crackable through brute-force.

Signup and view all the flashcards

WPA/WPA2 Hacking (with WPS)

An attack where, with WPS enabled, the key can be easily hacked through brute-force attacks on the 8-digit PIN, relatively fast due to short PIN length.

Signup and view all the flashcards

WPA/WPA2 Hacking (without WPS)

Attacks include deauthenticating the target to force re-authentication, recording the four-way handshake, and using dictionary attacks to crack the password.

Signup and view all the flashcards

ARP-Spoofing

A 'Man-in-the-Middle' attack where the attacker sends false ARP messages to both the router and victim, intercepting data packets.

Signup and view all the flashcards

DNS-Spoofing

An attack where the attacker manipulates DNS requests to redirect the victim to a fake website, often leading to phishing or other cybercrime.

Signup and view all the flashcards

Firewall vs IDS vs IPS

Software that either blocks or allows traffic based on rules, while IDS detects and reports suspicious activity, and IPS actively blocks it.

Signup and view all the flashcards

Certificates

Files that tell you whether you can trust the server and need regular updates to ensure the public key belongs to the actual site.

Signup and view all the flashcards

LOLBins

When an attacker uses existing system programs and scripts to carry out attacks instead of introducing new tools.

Signup and view all the flashcards

IPv6

A network setup where all devices can have a public, unique IP address and be directly accessible from the Internet without NAT.

Signup and view all the flashcards

Zero Trust

A security model based on the assumption that no one is automatically trustworthy, requiring every access request to be verified.

Signup and view all the flashcards

ElGamal

Encrypt a message with a public key, so only the holder of the private key can decrypt it.

Signup and view all the flashcards

Diffie-Hellman

Two parties jointly create a symmetric key without transmitting the entire key over the network; attackers cannot reconstruct the key.

Signup and view all the flashcards

RSA

This used to ensure that the server is genuine (Authentication).

Signup and view all the flashcards

DHE/ECDHE

This used for safe temporary session key negotiation (Perfect Forward Secrecy).

Signup and view all the flashcards

Employee on Site

An office-based employee connects using Ethernet or WLAN and obtains an internal IP address.

Signup and view all the flashcards

Remote work staff

Remote employees connect to the company VPN server using a VPN client and also receive an internal IP address.

Signup and view all the flashcards

Proxies secure clients

Allows you to switch clients and websites, regulates the traffic and hides the IP to the client.

Signup and view all the flashcards

Reverser proxy secures servers

Manages incoming traffic and hides the IP to the Server; includes Load Balance.

Signup and view all the flashcards

Domain controller

One that manages authentication and permissioning of users and computers in a network; typically found on internal networks and communicates with Clients and Servers.

Signup and view all the flashcards

User Agent spoofing

Changing user agent string to imitate a different device, browser, or operating system.

Signup and view all the flashcards

netdiscover -r 10.0.2.1/24

A command used to display all available IP addresses within the specified range.

Signup and view all the flashcards

nmap -T4 -A -v 10.10.10.29

A tool used to get complete details of the target machine.

Signup and view all the flashcards

Arpspoof

A tool to exploit ARP to become the Man in the Middle.

Signup and view all the flashcards

Bettercap

It’s a tool that gives a webinterface, used for exploitation.

Signup and view all the flashcards

hstshijack

Tool for downgrading HTTPS to HTTP.

Signup and view all the flashcards

Windows Recall

A feature of Windows. Images taken of screen can be reverted to later for searching.

Signup and view all the flashcards

DDoS

A cyberattack on a server.

Signup and view all the flashcards

Amplification-Angriffe

Send little, get a greater answer.

Signup and view all the flashcards

BigPhish

An agency focused on communication safety.

Signup and view all the flashcards

BIOS

Basic Input/Output System; Firmware, running on start-up.

Signup and view all the flashcards

WannaCry

A large Scale, damaging ransomware.

Signup and view all the flashcards

Cryptomixer

A Cryptocurrency Transaction Washer.

Signup and view all the flashcards

Zero Trust

Use specific permission for accessing data.

Signup and view all the flashcards

Phrack

Hackermagazine.

Signup and view all the flashcards

Intel ME

Intel Subsystem operating separate from OS.

Signup and view all the flashcards

MagicDNS

Automatic name creation for devices.

Signup and view all the flashcards

Study Notes

WEP (Wired Equivalent Privacy)

  • An original security standard WLANs used
  • It has weak encryption that can easily be cracked
  • It uses a weak 40-bit key
  • It is outdated and unsuitable for modern networks

WPA (Wi-Fi Protected Access)

  • An advancement over WEP
  • It uses Temporal Key Integrity Protocol (TKIP)
  • Dynamic keys are used, making it more secure than WEP
  • It is outdated and has some security vulnerabilities

WPA2 (Wi-Fi Protected Access 2)

  • Built as an evolution of WPA
  • Advanced Encryption Standard (AES) is employed
  • Security is enhanced significantly
  • It is a widely used standard for WLANs

WPA and WPA2 Features

  • Supports compatibility with older devices
  • Existing security vulnerabilities stem from WPA

WPA3 (Wi-Fi Protected Access 3)

  • The newest security standard for devices
  • Uses Simultaneous Authentication of Equals (SAE)
  • It enhances security against brute-force attacks
  • Currently the most secure standard for WLANs

WPS (Wi-Fi Protected Setup)

  • Enables automatic device connections to a network
  • Connection occurs by pushing a button or entering a PIN
  • It is practical but poses security risks, especially with the PIN option

WEP Hacking

  • WEP is vulnerable to brute-force attacks
  • The entire network traffic can get intercepted during an attack
  • The encrypted key can be cracked through brute-force
  • WEP is easily cracked, because it uses weak 40-bit keys

WPA and WPA2 Hacking (with WPS)

  • With WPS enabled and set to PIN-based config, an 8-digit PIN can be easily hacked
  • The attack is relatively fast because the PIN comprises only 4+4 digits

WPA and WPA2 Hacking (without WPS)

  • Deauthenticate the target to force re-authentication
  • Four-way handshake of the victim gets recorded
  • Use a dictionary attack on the hash to crack the password

Protecting Against Attacks

  • Do not use WEP for security
  • Opt for WPA2 or WPA3
  • Disable WPS
  • Set a very difficult password

ARP-Spoofing

  • A “Man-in-the-Middle” is positioned during an attack by sending fake ARP messages to both the router and the victim
  • The attacker tells the router that their MAC address is that of the victim, and vice versa; all data packets are routed through the attacker
  • The ARP protocol doesn’t verify the IP and MAC address pairings, enabling the attacker to pose as either the router or victim

DNS-Spoofing

  • The attacker manipulates the victim’s DNS queries by directing them to a fake website
  • The attacker sends false DNS responses with a fake IP address, redirecting the victim

Summary of Spoofing Attacks

  • During ARP-Spoofing the attacker intercepts data by spreading false MAC addresses, positioning themselves between the router and victim
  • DNS queries are manipulated during DNS-Spoofing to redirect the victim, leading to phishing

Proxies Explained

  • Proxys secure clients by regulating outgoing traffic and hiding the client's IP address Reverse proxys secure servers by regulating ingoing traffic, and they hide the server IP for load balance

Firewalls vs IDS vs IPS

  • A Firewall either blocks or allows traffic based on set rules
  • An IDS actively detects and reports suspicious activity but does not intervene
  • An IPS actively detects and blocks suspicious activity

Certificates

  • Certificates determine if a server is trustworthy
  • The server must renew the certificate every 3 months
  • An HTTPS site always needs a present and current certificate
  • Without a valid certificate, the connection is marked as unsafe, and modern browsers may block access

Trust Chain

  • The CA signature involves combining the server's public key with the CA's private key to form an encrypted server public key
  • Trust is established if the encrypted server public key, combined with the CA public key, matches the server's public key

LOLBins

  • In "Living off the Land" attacks, the attacker uses existing programs and scripts of the system to avoid detection

IPv6 Addresses

  • IPv6 can theoretically assign every device a unique, public IP, making NAT unnecessary

Zero Trust Explained

  • With zero trust, no one is automatically trusted within or outside the network
  • System, data, and application access is granted based on verification, regardless of network location

Browsing Anonymity

  • Browsing Chrome over Tor anonymizes traffic but lacks the privacy features of Tor Browser
  • Using Chrome within Tor Browser is theoretically the best solution, but is rarely practical, given that there are many anonymity layers
  • Tor Browser alone provides the most security, while Chrome with Tor offers basic anonymity only

Anonymity Networks

  • Kali anonsurf routes traffic completely over the Tor network
  • Starlink IPs cannot provide the geolocation data that traditional ISPs can

Asymmetric Encryption : ElGamal

  • A public/private key pair is created, and the public key is shared to allow others to send encrypted messages that only you can read

Diffie-Hellman Key Exchange

  • A symmetrical key is created without transmitting it over the internet
  • Parties exchange public data to reconstruct the same shared key

Key Elements for Encryption

  • Asymmetric Keys are used for signatures
  • Symmetric keys are used for MAC

Encryption Key Points

  • Used for authenticating a server’s realness
  • Ephemeral session keys are securely negotiated using DHE/ECDHE
  • Agreed-upon session key encrypts subsequent communications
  • The use of Diffie-Hellman is continuously renewed

VPN Usage In Business

  • The company either manages its own VPN server or hires a VPN provider to have a public IP address that is solely theirs; this is a "company VPN server"
  • VPN usage allows employees to have a secure and adaptable way to be productive, irrelevant to location

User Connection

  • Employees can connect to the company’s network through Ethernet or WLAN in their office space (internal IP Address will be assigned to device) while remote workers connect through a company VPN client (VPN server then assigns an IP address to device)
  • Both locations grant the same amount of user resource access

Spoofing User Agent

  • User agent spoofing involves changing the user agent string sent to impersonate another device, browser, or OS

Gathering Information Commands

  • Shows all IP addresses in a give range netdiscover -r 10.0.2.1/24
  • Zenman provides a GUI

ARP Spoofing Commands

  • arpspoof -i [interface] -t [clientIP] [gatewayIP]
  • arpspoof -i [interface] -t [gatewayIP] [clientIP]
  • arpspoof -i eth0 -t 10.0.2.7 10.0.2.1
  • arpspoof -i eth0 -t 10.0.2.1 10.0.2.7

Web Interface Usage

  • bettercap -> provides a web interface (http-ui) user/pass -Commands
  • bettercap -iface eth0
  • help -> help [module] -> [module] on
  • Set [parameter]
  • Caplets.show

Arp Spoofing

  • Net.probe on
  • Set arp.spoof.fullduplex true
  • Set arp.spoof.targets [ip]
  • Arp.spoof on
  • Set net.sniff.local true
  • Net.sniff on

HSTS-Hijacking

  • downgraded through “ssl strip”
  • In Chrome the HTST secure DNS must be “off” to work normally

Commands and Protocols

  • Set dns.spoof.address to redirect traffic -Set Dns.spoof.all true
  • Set the "dns.spoof.domains" parameter to reroute from a certain site. -dns.spoof on

Backdoor Protocol

  • Command Structure
  • Msfvenom -help and *Msfvenom --list payload give possible options
  • Msfvenom -payload [payload] [options] = [parameter] [out] is the construction for backdoor commands

Metasploit Usage

  • Steps for use
  • Msf console
  • Use exploit/multi/handler for show options
  • Set PAYLOAD windows/meterpreter/reverse_https
  • Show Options for further instrcutions

Exploits

  • Autoit can be used for non-friendly hacks
  • port forwarding is not for local IP addresses

###Beef Explained

  • If a Javascript script is preformed correctly it will connect the browser to beef

Meterpreter

  • Command structure
  • Msfconsole and Help

Website Upload

  • Generates shellcode for uploaded and execution when launched
  • help
  • Weevly generate -[password]-[path/filename] creates a shellcode, then to execute command
  • Weevly [url to file] -[password] connects to the URL for usage to initiate

Command Injection

  • Allows you to run multiple commands in a row (ping command example)

XSS

  • Client sided web application to store data with client
  • <script>alert(“XSS”)</script>
  • URL writing as GET and passing out

SQL Injection

  • Various attacks for data integrity (Command examples below)
  • Something' and 1=1-
  • Something' and 1=0 --
  • ‘,
  • Something' or 1=1 -- -ZAP is an auto-scanner for target website vulnerabilities

Background Exploits

  • Used with metasploit and veil-evaision (Background (current session))

Smuggling HTML

  • Inserts short code into the HTML for downloads

Authentication Parameters

  • Set EXE_Name (name/appearancesolexe
  • Session
  • Set session
  • Set exelcustim/uar-www-html/backdoor.Exe Exploit

###Obfuscating

  • Resorce Hacker and Confuser ex2 can preform functions

Password podcast

  • Lockbit is a well renown ransomware group

WiFi Connections

  • SSID-Irritum can incorrectly use wifi connections for other purposes

PFS

  • Perfect forward secrecy with keys

###Computer Usage

  • Quantencomputer problem with decryption,
  • Requires the doubling of keys

Monitoring

  • monitoring can only be viewed if an end-to-end is preformed

Key Windows Functions

  • Windows recall to scan information, but be mindful of Ddos attacks

Exploits

  • Cve nummern are indices dor exloits when a security breach is found

Protocols

  • Ocsp protocol can do real time validity checks

Scams

  • Like Linux, can be used to farm reputation or other activity

Injection

  • Ki model input to trigger manipulation and commands

Protection Script

  • Used for the client to send data to be checked externally ( Crowstrike example)

Malware

  • Created an attack/damage with several malicious functions

Exploiting Devices

  • Allows an exploit to connect on devices with several functions and ports

Security

Zero trust is where ever function is secured by encryption -open ssl is where tls is connected when safe -tablets with tls allow secure connection -safe boots do not require pc booting as often - telegram is not fully end-to-end -intel engine has independent funnctions

Security Exploits

  • Can cause adds to drop on browsers or devices

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Wifi Seguridad y Autenticación
12 questions
Examen de sécurité WLAN
0 questions

Examen de sécurité WLAN

HighSpiritedNebula5046 avatar
HighSpiritedNebula5046
Use Quizgecko on...
Browser
Browser