exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 333 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 333
Topic #: 1
[All 312-50v11 Questions]

Clark, a professional hacker, attempted to perform a Btlejacking attack using an automated tool, Btlejack, and hardware tool, micro:bit. This attack allowed Clark to hijack, read, and export sensitive information shared between connected devices. To perform this attack, Clark executed various btlejack commands.
Which of the following commands was used by Clark to hijack the connections?

  • A. btlejack -f 0x9c68fd30 -t -m 0x1fffffffff
  • B. btlejack -c any
  • C. btlejack -d /dev/ttyACM0 -d /dev/ttyACM2 -s
  • D. btlejack -f 0x129f3244 -j
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Daniel8660
Highly Voted 1 year ago
Selected Answer: A
Bluetooth Hacking - Btlejacking A Btlejacking attack is detrimental to Bluetooth low energy (BLE) devices. The attacker can sniff, jam, and take control of the data transmission between BLE devices by performing an MITM attack. Btlejacking Using BtleJack STEP 5: Now, start hijacking the connection:btlejack -f 0x9c68fd30 -t -m 0x1fffffffff (P.2351/2335)
upvoted 5 times
...
olakoreba
Most Recent 7 months, 2 weeks ago
Ans is A see page 2351
upvoted 2 times
...
Silascarter
1 year, 11 months ago
A is Correct. Btlejack is also able to hijack an existing connection, use the -t option to do so. Once hijacked, Btlejack will give you a prompt allowing you to interact with the hijacked device. First, hijack an existing connection: $ btlejack -f 0x9c68fd30 -t -m 0x1fffffffff BtleJack version 1.1
upvoted 2 times
...
Scryptic
2 years, 1 month ago
From the authors github site: Hijacking an existing BLE 5 connection I did not manage to hijack a BLE 5 connection at this time, as this attack is time-sensitive. My BLE 5 devices use a latency of 0, thus allowing no delay and causing this attack to fail. When I will get my hands on some legitimate BLE 5 devices, I will improve this. https://github.com/virtualabs/btlejack
upvoted 2 times
Scryptic
2 years, 1 month ago
Sorry... COntinuing, the commands are: Hijacking a BLE connection Btlejack is also able to hijack an existing connection, use the -t option to do so. Once hijacked, Btlejack will give you a prompt allowing you to interact with the hijacked device. First, hijack an existing connection: $ btlejack -f 0x9c68fd30 -t -m 0x1fffffffff
upvoted 5 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago