Which of the following techniques uses a modem in order to automatically scan a list of telephone
numbers?
A.
War driving
B.
War dialing
C.
Warchalking
D.
Warkitting
Explanation:
War dialing is a technique of using a modem to automatically scan a list of telephone numbers,
usually dialing every number in a local area code to search for computers, BBS systems, and fax
machines. Hackers use the resulting lists for various purposes, hobbyists for exploration, and
crackers (hackers that specialize in computer security) for password guessing.
Answer option C is incorrect. Warchalking is the drawing of symbols in public places to advertise
an open Wi-Fi wireless network. Having found a Wi-Fi node, the warchalker draws a special
symbol on a nearby object, such as a wall, the pavement, or a lamp post. The name warchalking
is derived from the cracker terms war dialing and war driving.
Answer option A is incorrect. War driving, also called access point mapping, is the act of locating
and possibly exploiting connections to wireless local area networks while driving around a city or
elsewhere. To do war driving, one needs a vehicle, a computer (which can be a laptop), a wireless
Ethernet card set to work in promiscuous mode, and some kind of an antenna which can be
mounted on top of or positioned inside the car. Because a wireless LAN may have a range that
extends beyond an office building, an outside user may be able to intrude into the network, obtain
a free Internet connection, and possibly gain access to company records and other resources.
Answer option D is incorrect. Warkitting is a combination of wardriving and rootkitting. In a
warkitting attack, a hacker replaces the firmware of an attacked router. This allows them to control
all traffic for the victim, and could even permit them to disable SSL by replacing HTML content as
it is being downloaded. Warkitting was identified by Tsow, Jakobsson, Yang, and Wetzel in 2006.
Their discovery indicated that 10% of the wireless routers were susceptible to WAPjacking
(malicious configuring of the firmware settings, but making no modification on the firmware itself)
and 4.4% of wireless routers were vulnerable to WAPkitting (subverting the router firmware). Their
analysis showed that the volume of credential theft possible through Warkitting exceeded the
estimates of credential theft due to phishing.
War dialing