Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v12 topic 1 question 81 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 81
Topic #: 1
[All 312-50v12 Questions]

You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the SSID “Brakeme-Internal.” You realize that this network uses WPA3 encryption.
Which of the following vulnerabilities is the promising to exploit?

  • A. Cross-site request forgery
  • B. Dragonblood
  • C. Key reinstallation attack
  • D. AP misconfiguration
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
g_man_rap
3 weeks, 2 days ago
A. Cross-site request forgery (CSRF): This is a web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. It targets web applications and is not related to breaking wireless encryption. B. Dragonblood: This is a vulnerability that was found in the WPA3 Wi-Fi security standard. It consists of a set of issues that affect WPA3's Simultaneous Authentication of Equals (SAE) handshake (also known as Dragonfly), which is a part of the protocol meant to improve upon the security of WPA2. C. Key reinstallation attack (KRACK): This refers to a security flaw in the WPA2 protocol that allows attackers to intercept and decrypt Wi-Fi traffic between wireless devices and the targeted Wi-Fi network. This would not be relevant to WPA3, which is designed to mitigate such vulnerabilities that were present in WPA2. D. AP misconfiguration: This refers to improper setup or configuration errors made on wireless access points. While this could potentially include errors in implementing WPA3, AP misconfiguration is a broad term that doesn't specifically target WPA3's encryption.
upvoted 2 times
...
Vincent_Lu
11 months, 1 week ago
B. Dragonblood
upvoted 2 times
...
sausageman
1 year, 1 month ago
Selected Answer: B
B. Dragonblood
upvoted 1 times
...
sausageman
1 year, 1 month ago
B. Dragonblood
upvoted 1 times
...
jeremy13
1 year, 1 month ago
Selected Answer: B
B. Dragonblood Like 312-50v11 Q224 same as tc5899 CEH V12 Module16 P2510
upvoted 3 times
...
tc5899
1 year, 1 month ago
Selected Answer: B
B- Dragonblood is a set of vulnerabilities in the WPA3 security standard that allows attackers to recover keys, downgrade security mechanisms, and launch various information-theft attacks Attackers can use various tools, such as Dragonslayer, Dragonforce, Dragondrain, and Dragontime, to exploit these vulnerabilities and launch attacks on WPA3-enabled networks. CEH v11 manual. pg. 2322
upvoted 3 times
...
eli117
1 year, 1 month ago
Selected Answer: C
C. Key reinstallation attack WPA3 is the latest encryption protocol for wireless networks and is considered more secure than its predecessor, WPA2. However, WPA3 is still susceptible to the Key Reinstallation Attack (KRACK), which is a vulnerability that allows attackers to intercept and manipulate network traffic. In a KRACK attack, an attacker exploits a flaw in the WPA3 protocol that allows them to reinstall an already-in-use key. This can enable the attacker to decrypt, replay, or manipulate network traffic, which can compromise the security of the network.
upvoted 1 times
woohoolou
9 months, 1 week ago
KRACK is for WPA2
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...