CompTIA Network+ Exam: Wireless-Based Attack - Proof of Concept

Wireless-Based Attack - Proof of Concept

Prev Question Next Question

Question

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization's network.

As part of the attack, the analyst launches a fake access point matching the SSID of the organization's guest access network.

When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation.

Which of the following attacks has the analyst successfully performed in this scenario?

A.

Bluesnarfing B.

Session hijacking C.

MAC spoofing D.

VLAN hopping E.

Man-in-the-middle.

E.

Explanations

An analyst is developing a proof of concept of a wireless-based attack as part of a penetration test against an organization's network.

As part of the attack, the analyst launches a fake access point matching the SSID of the organization's guest access network.

When a user connects to the fake access point, the analyst allows the traffic to flow through the access point to the legitimate site while the data traversing the network is logged for latest analysis and exploitation.

Which of the following attacks has the analyst successfully performed in this scenario?

A.

Bluesnarfing

B.

Session hijacking

C.

MAC spoofing

D.

VLAN hopping

E.

Man-in-the-middle.

E.

The analyst has successfully performed a Man-in-the-middle (MitM) attack in this scenario.

A Man-in-the-middle attack is an attack where an attacker intercepts and relays communication between two parties who believe they are communicating directly with each other. In this scenario, the attacker launches a fake access point that matches the SSID of the organization's guest access network. When a user connects to this fake access point, the attacker intercepts and relays the communication between the user and the legitimate site. This allows the attacker to log the traffic passing through the access point for later analysis and exploitation.

Bluesnarfing is a type of attack where an attacker gains unauthorized access to a Bluetooth-enabled device and steals data such as contact lists, emails, and text messages. This attack is not relevant in this scenario.

Session hijacking is a type of attack where an attacker takes control of a legitimate user's session with a website or application. This attack is not relevant in this scenario.

MAC spoofing is a technique where an attacker changes the MAC address of their device to impersonate another device on the network. This attack is not relevant in this scenario.

VLAN hopping is a technique where an attacker sends packets to a switch to bypass VLAN segmentation and gain access to other parts of the network. This attack is not relevant in this scenario.

Therefore, the correct answer is E, Man-in-the-middle.