During a red-team exercise, a penetration tester obtains an employee's access badge. The tester uses the badge's information to create a duplicate for unauthorized entry. Which of the following best describes this action?
RFID Cloning:
RFID (Radio-Frequency Identification) cloning involves copying the data from an access badge and creating a duplicate that can be used for unauthorized entry.
Tools like Proxmark or RFID duplicators are commonly used for this purpose.
Why Not Other Options?
A (Smurfing): A network-based denial-of-service attack, unrelated to physical access.
B (Credential stuffing): Involves using stolen credentials in bulk for authentication attempts, unrelated to badge cloning.
D (Card skimming): Relates to stealing credit card information, not access badges.
CompTIA Pentest+ Reference:
Domain 3.0 (Attacks and Exploits)
Raylene
2 months agoVenita
2 months agoIlda
3 months agoWenona
3 months agoLaine
3 months agoCurt
1 months agoDottie
1 months agoMelissia
1 months agoAmie
1 months agoDell
2 months agoBenedict
2 months agoBarrett
2 months agoErick
2 months agoDonette
2 months agoCarlota
2 months agoEdward
2 months agoCherrie
2 months agoLashandra
2 months agoJimmie
3 months agoLavonne
3 months agoDean
3 months agoCecilia
2 months agoMaricela
2 months agoBronwyn
2 months agoCary
2 months ago