exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 224 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 224
Topic #: 1
[All 312-50v11 Questions]

You are a penetration tester tasked with testing the wireless network of your client Brakeme SA. You are attempting to break into the wireless network with the
SSID `Brakeme-Internal.` You realize that this network uses WPA3 encryption.
Which of the following vulnerabilities is the promising to exploit?

  • A. Cross-site request forgery
  • B. Dragonblood
  • C. Key reinstallation attack
  • D. AP misconfiguration
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
blacksheep6r
Highly Voted 1 year, 6 months ago
B- Dragonblood is a set of vulnerabilities in the WPA3 security standard that allows attackers to recover keys, downgrade security mechanisms, and launch various information-theft attacks Attackers can use various tools, such as Dragonslayer, Dragonforce, Dragondrain, and Dragontime, to exploit these vulnerabilities and launch attacks on WPA3-enabled networks. CEH v11 manual. pg. 2322
upvoted 13 times
...
Kamal_SriLanka
Highly Voted 1 year, 9 months ago
B: Dragonblood
upvoted 5 times
...
Daniel8660
Most Recent 6 months, 3 weeks ago
Selected Answer: B
WPA3 Encryption Cracking Dragonblood is a set of vulnerabilities in the WPA3 security standard that allows attackers to recover keys, downgrade security mechanisms, and launch various information-theft attacks. (P.2322/2306) 1. Downgrade Security Attacks 2. Side-channel Attacks
upvoted 3 times
...
Scryptic
1 year, 8 months ago
Flaws in WPA3 The design flaws we discovered can be divided in two categories. The first category consists of downgrade attacks against WPA3-capable devices, and the second category consists of weaknesses in the Dragonfly handshake of WPA3, which in the Wi-Fi standard is better known as the Simultaneous Authentication of Equals (SAE) handshake. The discovered flaws can be abused to recover the password of the Wi-Fi network, launch resource consumption attacks, and force devices into using weaker security groups. All attacks are against home networks (i.e. WPA3-Personal), where one password is shared among all users.
upvoted 5 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago