312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 22


Bobby, an attacker, targeted a user and decided to hijack and intercept all their wireless communications. He installed a fake communication tower between two authentic endpoints to mislead the victim. Bobby used this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user’s request, Bobby manipulated the traffic with the virtual tower and redirected the victim to a malicious website.

What is the attack performed by Bobby in the above scenario?

Show Answer
Correct Answer: A

Bobby installed a fake communication tower between two authentic endpoints to mislead the victim and intercept and manipulate their wireless communications. This type of attack involves setting up a rogue base station that mimics a legitimate cell tower to hijack data transmission between the user and a real tower. This description matches the characteristics of an aLTEr attack, where the attacker can intercept, monitor, and manipulate traffic, redirecting the victim to malicious websites.

Discussion

5 comments
Sign in to comment
jeremy13Option: A
Oct 10, 2023

A. aLTEr Attack BOOK V12 Module 16 P2425 The aLTEr attack is usually performed on LTE devices that encrypt user data in the AES counter (AES-CTR) mode, which provides no integrity protection. To perform this attack, the attacker installs a virtual (fake) communication tower between two authentic endpoints to mislead the victim. The attacker uses this virtual tower to interrupt the data transmission between the user and real tower, attempting to hijack an active session. Upon receiving the user’s request, the attacker manipulates the traffic with the virtual tower and redirects the victim to malicious websites.

I_Know_Everything_KY
Aug 12, 2024

"Usually". LOL.

eli117Option: A
Oct 4, 2023

A. aLTEr attack. Bobby installed a fake communication tower between two authentic endpoints to intercept and hijack all the wireless communications of a user. This is an example of an aLTEr (Advanced LTE Recovery) attack, also known as an IMSI (International Mobile Subscriber Identity) catcher or a fake cell tower attack. In this attack, the attacker sets up a rogue base station that mimics a legitimate cell tower to trick mobile devices into connecting to it. Once connected, the attacker can intercept, monitor, and manipulate the traffic between the device and the legitimate cell tower.

I_Know_Everything_KY
Aug 12, 2024

Answer is A, but this is a purely theoretical attack with near-zero chance of being pulled off. HSTS makes it 100% impossible. Why EC-Council insists on glorifying threat-p0rn is beyond me.

qtygbapjpesdayazko
Aug 13, 2024

Its A, and you are right.

insaniunt
May 26, 2024

A. aLTEr attack

Mann098Option: A
Dec 29, 2024

aLTEr attack