3.2 Attacks & exploits: Wireless Attacks Flashcards
Wireless Security: when should you use a pre-shared key to enhance security?
Used when the access point and the client need to use the same encryption key to encrypt and decrypt the da
Wireless Security: what is WEP and why it is no longer secure ?
Wired Equivalent Privacy (WEP)
▪ Original 802.11 wireless security standard that claims to be as secure as a wired network
▪ WEP was designed to use a static 40-bit pre-shared encryption key with RC4 encryption cipher
▪ WEP’s weakness is its 24-bit initialization vector (IV)
Wireless Security: what is WPA and why is it no longer secure?
Wi-Fi Protected Access (WPA)
▪ Replacement for WEP which uses TKIP, Message Integrity Check (MIC), and RC4 encryption
▪ WPA was flawed (= defectueux), so it was replaced by WPA2
Wireless Security: what is WPA2?
Wi-Fi Protected Access Version 2 (WPA2)
▪ 802.11i standard that provides better wireless security featuring AES with a 128-bit key, CCMP, and integrity checking
▪ WPA2 can be operated in either personal or enterprise mode
Wireless Security: what is WPA3 and what are the different type of WPA3 (2)?
▪ Designed to strengthen the flaws and weakness that can be exploited inside of WPA2
▪ Types:
● WPA3 Enterprise (256-bit AES with SHA-384)
● WPA3 Personal (128-bit AES with CCMP)
Wireless Security: what is the largest improvement of WPA3 ?
The largest improvement in WPA3 is the removal of the Pre-Shared Key (PSK) exchange
Wireless Security: in WPA3, what Simultaneous Authentication of Equals (SAE) is used for ?
Uses a secure password-based authentication and a password authenticated, key agreement methodology to secure networks
Wireless Security: in WPA3, what Forward Secrecy/Perfect Forward Secrecy is for?
A feature of a key agreement protocol that provides assurance that session keys will not be compromised even if long-term secrets used in the session key exchange are compromised
Wireless Security: explain the process of Forward Secrecy/Perfect Forward Secrecy
o AP and the client use a public key system to generate a pair of long-term keys
o AP and the client exchange a one-time use session key
o AP sends client messages and encrypts them using the created session key
o Client decrypts received messages using the same one-time use session key
o Process repeats for each message being sent, starting at Step 2 to ensure forward secrecy
Wireless Security: what is Wi-Fi Protected Setup (WPS) and how does it works?
▪ Designed to make setting up new wireless devices easier for consumers and end users
▪ WPS relies on an 8-digit PIN code to conduct its authentication
Wireless Security: is Wi-Fi Protected Setup (WPS) secure ?
No, WPS is vulnerable to attacks and should always be disabled.
As a penetration tester, identify those WPS-enabled devices for your engagements
Wireless Security: what is MAC filtering for?
Defines a list of devices and only allows those on your Wi-Fi network
Signal Exploitation: why should you do signal exploitation?
Aims to collect, manipulate, and exploit the wireless radio waves and signals that are passing freely throughout a given location
Signal Exploitation: list the type and antenna from which you can collect wireless radio and explain how they work (2)?
▪ Omnidirectional:
● Radiates power equally in all directions
● Omnidirectional is the least secure method of transmission
● An omnidirectional antenna is what is connected by default to your laptop’s Wi-Fi card
▪ Unidirectional (e.g., Yagi antenna):
● Focuses power in one direction for covering greater distances
● You can use omnidirectional antenna to identify targets, then switch to unidirectional antenna
Signal Exploitation: what is Decibels Per Isotropic (dBi)?
▪ Amount of forward gain of a given antenna
▪ As the forward gain increases, the signal becomes more directional
Signal Exploitation: list the different ways to exploit a signal (3)?
▪ Eavesdropping
▪ Deauthentication
▪ Jamming