During a red-team exercise, a penetration tester obtains an employee's access badge. The tester uses the badge's information to create a duplicate for unauthorized entry. Which of the following best describes this action?
RFID Cloning:
RFID (Radio-Frequency Identification) cloning involves copying the data from an access badge and creating a duplicate that can be used for unauthorized entry.
Tools like Proxmark or RFID duplicators are commonly used for this purpose.
Why Not Other Options?
A (Smurfing): A network-based denial-of-service attack, unrelated to physical access.
B (Credential stuffing): Involves using stolen credentials in bulk for authentication attempts, unrelated to badge cloning.
D (Card skimming): Relates to stealing credit card information, not access badges.
CompTIA Pentest+ Reference:
Domain 3.0 (Attacks and Exploits)
Ernie
3 months agoAleta
3 months agoStarr
3 months agoSharen
4 months agoJessenia
4 months agoMabelle
4 months agoAsuncion
4 months agoCandida
4 months agoArt
5 months agoDelsie
5 months agoAlona
5 months agoJulio
5 months agoLindsey
5 months agoTran
5 months agoRaylene
1 year agoVenita
1 year agoIlda
1 year agoWenona
1 year agoLaine
1 year agoCurt
1 year agoDottie
1 year agoMelissia
1 year agoAmie
1 year agoDell
1 year agoBenedict
1 year agoBarrett
1 year agoErick
1 year agoDonette
1 year agoCarlota
1 year agoEdward
1 year agoCherrie
1 year agoLashandra
1 year agoJimmie
1 year agoLavonne
1 year agoDean
1 year agoCecilia
1 year agoMaricela
1 year agoBronwyn
1 year agoCary
1 year ago