Page 802 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 802

now that internet connectivity is nearly ubiquitous, with most of us
               carrying an internet-connected device on our person (usually a

               smartphone), the popularity of portable Wi-Fi hotspots, and many
               retail establishments offering free Wi-Fi as an incentive for customers,
               the need for and occurrence of war chalking has faded. When an
               attacker uses war dialing to locate a wireless target to compromise,
               they don’t mark up the area with special symbols to inform others of
               their intentions.


               Replay


               A replay attack is the retransmission of captured communications in
               the hope of gaining access to the targeted system. Replay attacks in
               relation to wireless environments specifically may continue to focus on
               initial authentication abuse. However, many other wireless replay
               attack variants exist. They include capturing new connection requests
               of a typical client and then replaying that connect request in order to
               fool the base station into responding as if another new client

               connection request was initiated. Wireless replay attacks can also
               focus on DoS by retransmitting connection requests or resource
               requests of the base station in order to keep it busy focusing on
               managing new connections rather than maintaining and providing
               service for existing connections.

               Wireless replay attacks can be mitigated by keeping the firmware of
               the base station updated as well as operating a wireless-focused

               network intrusion detection system (NIDS). A W-IDS or W-NIDS will
               be able to detect such abuses and inform the administrators promptly
               about the situation.


               IV

               IV stands for initialization vector, a mathematical and cryptographic
               term for a random number. Most modern crypto functions use IVs to
               increase their security by reducing predictability and repeatability. An
               IV becomes a point of weakness when it’s too short, exchanged in plain

               text, or selected improperly. Thus, an IV attack is an exploitation of
               how the IV is handled (or mishandled). One example of an IV attack is
               that of cracking Wireless Equivalent Privacy (WEP) encryption.
   797   798   799   800   801   802   803   804   805   806   807