ExamGecko
Question list
Search
Search

Related questions











Question 240 - 312-50v12 discussion

Report
Export

Richard, an attacker, aimed to hack loT devices connected to a target network. In this process.

Richard recorded the frequency required to share information between connected devices. After obtaining the frequency, he captured the original data when commands were initiated by the connected devices. Once the original data were collected, he used free tools such as URH to segregate the command sequence. Subsequently, he started injecting the segregated command sequence on the same frequency into the loT network, which repeats the captured signals of the devices. What Is the type of attack performed by Richard In the above scenario?

A.
Side-channel attack
Answers
A.
Side-channel attack
B.
Replay attack
Answers
B.
Replay attack
C.
CrypTanalysis attack
Answers
C.
CrypTanalysis attack
D.
Reconnaissance attack
Answers
D.
Reconnaissance attack
Suggested answer: B

Explanation:

Replay Attack could be a variety of security attack to the info sent over a network.

In this attack, the hacker or a person with unauthorized access, captures the traffic and sends communication to its original destination, acting because the original sender. The receiver feels that it's Associate in Nursing genuine message however it's really the message sent by the aggressor. the most feature of the Replay Attack is that the consumer would receive the message double, thence the name, Replay Attack.

Prevention from Replay Attack :

1. Timestamp technique –

Prevention from such attackers is feasible, if timestamp is employed at the side of the info.

Supposedly, the timestamp on an information is over a precise limit, it may be discarded, and sender may be asked to send the info once more.

2. Session key technique –

Another way of hindrance, is by victimisation session key. This key may be used one time (by sender and receiver) per dealing, and can't be reused.

asked 18/09/2024
Jessica Mahoney
37 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first