16 - Hacking Wireless Networks Flashcards
How does a Wireless network work?
Data is transmitted by means of electromagnetic waves to carry signals over the communication path.
What are some common wireless terminologies?
- GSM: Used for mobile transportation for wireless network worldwide.
- Bandwidth: Describes the amount of info that may be broadcasted over a connection
- Basic Service Set Identifier (BSSID): The MAC address of an access point that has set up a Basic Service Set (BSS)
- ISM band: Frequency band for international Industrial, Scientific, and Medical communities
- Access Point: Used to connect wireless devices to a wireless/wired network.
- Hotspot: Places where wireless network is available for public use.
- Association: The process of connecting a wireless device to an access point.
- Service Set Identifier (SSID): A 32 alphanumeric character unique identifier given to a wireless LAN.
- Orthogonal Frequency-division Multiplexing (OFDM): Method of encoding digital data on multiple carrier frequencies
- Multiple Input, Multiple Output Orthogonal Frequency Divisional Multiplexing (MIMO-OFDM): Air interface for 4G and 5G broadband wireless comms.
- Direct-sequence Spread Spectrum (DSSS): Original data signal is multiplied with a pseudo random noise spreading code.
- Frequency-hopping Spread Spectrum (FHSS): Method of transmitting radio signals by rapidly switching a carrier among many frequency channels.
What is Wi-Fi?
A WLAN that is based on IEEE 802.11 standard where it allows the device to access the network from anywhere within range of an access point.
What are some advantages/disadvantages for wireless networks?
- Advantages: Fast & easy installation, easy to provide connectivity, access can be from anywhere within range, access for the public.
- Disadvantages: Issues with security, as computers increase bandwidth suffers.
What are the different types of Wireless Networks?
- Extension to a Wired Network: By placing AP’s between wired and wireless devices to extend an network.
- Multiple Access Points: Connects computers wirelessly by using multiple AP’s.
- LAN-to-LAN Wireless Networks: Interconnecting LAN’s via AP’s.
- 3G/4G Hotspot: A type of wireless network that provides Wi-Fi access to Wi-Fi enabled devices.
What are the different wireless standards?
-
802.11 (Wi-Fi):
- Applies to wireless LANs and uses FHSS or DSSS as the frequency hopping spectrum
-
802.11a:
- Second extension to the original 802.11 and operates in the 5GHz range.
- Supports bandwidth up to 54 Mbps by using OFDM
- It is a fast standard but is sensitive to walls and other obstacles.
-
802.11b:
- Operates in the 2.4 GHz ISM band
- Supports up to 11 Mbps by using DSSS
-
802.11d:
- Enhanced version of a and b.
- The particulars of this domain can be set at the MAC layer.
-
802.11e:
- Defines QoS for wireless applications
- Standard maintains the quality of video and audio streaming, etc.
-
802.11g:
- Supports a max bandwidth of 54Mbps using OFDM and uses 2.4GHz.
- Compatible with 802.11b which means 802.11b devices can work directly with an 802.11g access point.
-
802.11i:
- Provides improved encryption for networks
- Requires protocols such as TKIP, AES
-
802.11n:
- Developed to improve 802.11g in terms of bandwidth
- Operates on 2.4 and 5 GHz and supports a max data rate up to 300Mbps.
-
802.11ac:
- Operates on 5GHz
- Faster and more reliable than 802.11n.
- Involves Gigabit networking that provides an instantaneous experience
-
802.11ad:
- Works on the 60GHz spectrum
- Transfer speed is much higher than 802.11n
-
802.12:
- Works on the demand media utilization by working on the demand priority protocol.
- Ethernet speed increases to 100Mbps
-
802.15:
- It defines the standards for a wireless personal area network (WPAN).
-
802.15.1 (Bluetooth):
- Bluetooth is mainly used for exchanging data over short distances fixed and mobile devices.
-
802.15.4 (ZigBee):
- Has a low data rate and complexity.
- Transmits long distance data through the mesh network.
- 250kbits/s
-
802.15.5:
- The standard deploys itself on a full mesh or half mesh topology.
-
IEEE 802.16:
- WiMax
- Standard for fixed broadband wireless metropolitan networks (MANs) that use a point-to-multipoint architecture.
What are the types of authentication modes for Wi-Fi?
- Open System Authentication Process: Where any wireless client can be authenticated with the AP’s.
- Shared Key Authentication Process: Where both the AP and client use the same WEP key to provide authentication.
- Centralized Authentication Server: Where a RADIUS servers sends authentication keys to both AP and client for authentication. The key enables the AP to identify a particular wireless client.
What are the types of Wireless Antennas?
-
Directional Antenna:
- Used to broadcast and obtain radio waves from a single direction
-
Omnidirectional Antenna:
- Provides 360 degree horizontal radiation.
-
Parabolic Grid Antenna:
- Based on the principle of a satellite dishes but doesn’t have solid backing, can pick up Wi-Fi signals from a distance of 10 miles.
-
Yagi Antenna:
- A unidirectional antenna for a frequency band of 10MHz to VHF and UHF.
-
Dipole Antenna:
- Bidirectional antenna, used to support client connections rather that site-to-site applications.
-
Reflector Antennas:
- Used to concentrate EM energy which is radiated or received at a focal point.
What are the types of wireless encryption?
- 802.11i: amendment that specifies security mechanisms for 802.11 wireless networks
- WEP: Encryption algos for 802.11 networks
- LEAP: Proprietary version of EAP developed by Cisco
- WPA: Advanced wireless encryption protocol using TKIP and MIC.
- TKIP: Security protocol used in WAP as a replacement for WEP
- WPA2: Upgrade to WPA using AES and CCMP for encryption
- AES: Symmetric-key encryption used in WPA2
- CCMP: Encryption protocol used in WPA2
- WPA2 Enterprise: Integrates EAP standards for WPA2 encryption.
- EAP: Supports multiple encryption standards such as token cards, Kerberos, certificates, etc.
- RADIUS: Centralized authentication and authorization management system
- PEAP: Protocol that encapsulates the EAP within an encrypted tunnel and authenticated Transport Layer Security (TLS) tunnel.
What are some issues/concerns with WEP?
- IV’s is too short, 24 bits
- Identical key streams
- Lack of centralized key management
- Cipher was meant to be one time used.
- No defined method for encryption key distribution
- Prone to password cracking attacks
What are the different types of Wireless attacks?
-
Access Control Attacks: Aim to penetrate a network by evading WLAN access control measures.
- War Driving
- Rogue Access Points
- MAC Spoofing
-
Integrity Attacks: Attackers send forged control, management or data frames over a wireless network to misdirect wireless devices in order to perform another type of attack.
- WEP Injection
- Data Replay
- RADIUS Replay
-
Confidentiality Attacks: These attacks attempt to intercept confidential info sent over wireless associations, whether clear text or encrypted by Wi-Fi protocols.
- Eavesdropping
- Traffic Analysis
- Cracking WEP Key
-
Availability Attacks: Aims at obstructing the delivery of wireless services to legit users, either by crippling those resources or denying them access to WLAN resources.
- Access Point Theft
- DoS
- Authenticate Flood
-
Authentication Attacks: To steal the identity of Wi-Fi clients
- Identity Theft
- LEAP Cracking
- VPN Login Cracking
- Password Speculation
What is a rogue access point attack?
Attacker sets up AP near a target network in order to lure user’s to connect
What is client mis-association?
Attacker sets up access point in a neighboring network of the corporate perimeter and lures users to connect.
What is a honeypot access point attack?
Where an attacker sets up a legit looking network amongst many other nearby networks and lures someone to connect.
What is an AP MAC Spoofing?
Where an attacker spoofs a MAC address to connect as an authorized user.
How can a DoS attack occur on a wireless network?
An attacker sends an de-authentication request and the devices disconnect