exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 259 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 259
Topic #: 1
[All 312-50v12 Questions]

Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands.

Which of the following commands was used by Clark to hijack the connections?

  • A. btlejack -f 0x9c68fd30 -t -m 0x1fffffffff
  • B. btlejack -c any
  • C. btlejack -d /dev/ttyACM0 -d /dev/ttyACM2 -s
  • D. btlejack -f 0x129f3244 -j
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
e020fdc
2 days, 5 hours ago
Selected Answer: D
From ChatGPT Command Breakdown for Option D: -f 0x129f3244: This sets the Access Address of the BLE connection you want to target. The Access Address is unique to each BLE connection. -j: This flag is used to hijack the BLE connection once it is discovered and captured. This is the correct combination for performing a Btlejacking attack — it focuses on hijacking an already established BLE connection. Quick Breakdown of Other Options: A. btlejack -f 0x9c68fd30 -t -m 0x1fffffffff The -t and -m options are related to sniffing and channel map tracking, not hijacking. B. btlejack -c any This command is used for sniffing connections on any channel, not hijacking. C. btlejack -d /dev/ttyACM0 -d /dev/ttyACM2 -s This is used for multi-device sniffing, combining multiple micro:bit dongles for better packet capture.
upvoted 1 times
...
g_man_rap
6 months, 3 weeks ago
D is more accurate. D. btlejack -f 0x129f3244 -j This command is explicitly aimed at hijacking an ongoing BLE connection on the specified frequency, aligning perfectly with the scenario's description of hijacking to read and export sensitive information. To hijack a connection, as described in option D with the -j flag, involves actively intervening in the communication. This means inserting the attacker’s device into the communication flow in a way that allows them to intercept, modify, or block the data being exchanged without the original devices noticing. This is more aggressive and direct in terms of interaction compared to merely tracking. Thus, while option A is very relevant for understanding the dynamics of the communication and could be a precursor to an effective hijacking (by knowing where and how to hijack), it does not by itself perform the action of hijacking. Therefore, it's correct to say that option A could be part of the process leading up to a hijack, but it isn't the command that would be used to execute the hijacking. The specific action of hijacking in Btlejack is indicated by the -j flag, as shown in option D.
upvoted 2 times
...
LordXander
7 months, 3 weeks ago
Selected Answer: A
CEHv12 2538
upvoted 2 times
...
insaniunt
9 months ago
Selected Answer: A
Module 16 Page 2538
upvoted 2 times
...
Lunko
9 months ago
Selected Answer: A
Hijacking a BLE connection Btlejack is also able to hijack an existing connection, use the -t option to do so. Once hijacked, Btlejack will give you a prompt allowing you to interact with the hijacked device. First, hijack an existing connection: $ btlejack -f 0x9c68fd30 -t -m 0x1fffffffff BtleJack version 1.1 [i] Using cached parameters (created on 2018-08-11 01:48:24) [i] Detected sniffers: > Sniffer #0: fw version 1.1 [i] Synchronizing with connection 0x9c68fd30 ... ✓ CRCInit: 0x81f733 ✓ Channel map is provided: 0x1fffffffff ✓ Hop interval = 39 ✓ Hop increment = 9 [i] Synchronized, hijacking in progress ... [i] Connection successfully hijacked, it is all yours \o/ btlejack>
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...