10A: Discover Wireless Attacks Flashcards
3.2 Given a scenario, research attack vectors and perform wireless attacks. 5.3 Explain use cases of the following tools during the phases of a penetration test.
An early wireless encryption standard that features the Temporal Key Integrity Protocol (TKIP). TKIP dynamically generates a new 128-bit key for each packet. In addition, this standard includes a Message Integrity Check (MIC), which provides a stronger method (than a CRC) to ensure data integrity
WPA
An improvement of WPA and replaced RC4 and TKIP with Counter Mode CBC-MAC Protocol (CCMP) using AES.
WPA2
The latest wireless encryption standard, includes advanced features to secure wireless transmissions such as 192-bit encryption. It also features improved authentication, employs a 48-bit initialization vector, and uses Protected Management Frames (PMFs) to prevent exposure of management traffic.
WPA3
A tool that provides the ability to capture 802.11 frames and then use the output to identify the Basic Service Set ID (MAC address) of the access point along with the MAC address of a victim client device.
airodump-ng
An attack in which radio waves disrupt 802.11 wireless signals.
jamming
Command-line tool used to perform brute force attacks against WPS-enabled access points.
Reaver
In EAP architecture, the device requesting access to the network.
supplicant
A PNAC switch or router that activates EAPoL and passes a supplicant’s authentication data to an authenticating server, such as a RADIUS server.
authenticator
EAP implementation that uses a server-side certificate to create a secure tunnel for user authentication, referred to as the inner method.
PEAP
A rogue access point that attempts to trick users into believing that it is a legitimate AP, such as an organization’s official Wi-Fi network
Evil Twin