Wireless and Radio Frequency Attacks
This chapter includes questions on the following topics:
• Wireless and RF-based vulnerabilities
• Various use cases of tools
• Tool output or data related to a penetration test
Wired connections are increasingly a thing of the past for both the home consumer and enterprise-level users; convenience is a driving factor for both markets, but this is often a double-edged sword. What is gained in convenience often also increases the attack surface. This shows itself in a multitude of wireless communication standards: 802.11 Wi-Fi, Bluetooth, and NFC are just a few of the most common of these. In addition to the inherent risk of wireless communications being intercepted, it is not uncommon to ...