ExamGecko
Question list
Search
Search

Related questions











Question 255 - 312-50v12 discussion

Report
Export

Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session, upon receiving the users request. Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.

What is the attack performed by Bobby in the above scenario?

A.
Wardriving
Answers
A.
Wardriving
B.
KRACK attack
Answers
B.
KRACK attack
C.
jamming signal attack
Answers
C.
jamming signal attack
D.
aLTEr attack
Answers
D.
aLTEr attack
Suggested answer: D

Explanation:

https://alter-attack.net/media/breaking_lte_on_layer_two.pdf

The new aLTEr attack can be used against nearly all LTE connected endpoints by intercepting traffic and redirecting it to malicious websites together with a particular approach for Apple iOS devices.

This attack works by taking advantage of a style flaw among the LTE network — the information link layer (aka: layer-2) of the LTE network is encrypted with AES-CTR however it's not integrityprotected, that is why an offender will modify the payload.

As a result, the offender is acting a classic man-in-the-middle wherever they're movement as a cell tower to the victim.

asked 18/09/2024
Kurt Woodfin
43 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first