3.4 - Wireless Security Flashcards
1
Q
Wireless networks
A
- Require additional security controls, since anyone nearby can listen in
- Authenticate (username + passwords, multifactor authentication, 802.1x, smart cards etc)
- Encrypt all data (everyone has an encryption key) to send and receive data
- Verify the integrity of all communication (original received is original), sometimes called an MIC (message integrity check)
2
Q
MIC
A
- Message integrity check
- verify that that data receives matches the data sent
3
Q
WPA2
A
- Wi-Fi Protected Access II
- Certification began in 2004
- Uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol or Counter (CBC-MAC Protocol)
- Challenges: although not insecure, it is susceptible to brute force attacks
- listen to the four-way handshake (some methods can derive the PSK hash without the handshake)
- once attacker have hash they can begin brute force to try to get the pre-share key
- remember GPU processors are fast and cloud based password cracking make brute force easier
- Once you have the PSK (pre - shared key) you have access to everyone’s wireless key (there’s no forward secrecy)
4
Q
WPA3
A
- Wi-Fi Protected Access III
- Introduced in 2018
- uses a different block cipher mode (GCMP - Galois/Counter Mode Protocol)
- stronger encryption than WPA2
- avoids the hashing problem of WPA3 (includes a mutual authentication, creates a shared session key without sending that key across the network)
- no more handshaking or hashes being sent
- has perfect forward secrecy
5
Q
CCMP
A
- Counter Mode with Cipher Block Chaining Message Authentication Code Protocol or Counter CBC-MAC Protocol
- Is used by WPA2 (wi-fi protected access II)
6
Q
CCMP Security Services
A
- Data Confidentiality with AES
- Message Integrity Check (MIC) with CBC- MAC
7
Q
GCMP
A
- Used in WPA III (Wifi protected access III)
- stronger encryption than WPA2
- Data confidentiality still uses AES, but the MIC (message integrity check) uses the GMAC (Galois Message Authentication Code) instead of the CBC-MAC
8
Q
PSK
A
- Pre- shared key
9
Q
Perfect Forward Secrecy
A
- Session keys change often and everyone has a different session key
10
Q
SAE
A
- Simultaneous Authentication of Equals
- Derived from Diffie-Hellman key exchange with an authentication component
- Everyone uses a different session key, even with the same PSK
- An IEEE - standard (802.11 standard) - the dragonfly handshake
11
Q
Wireless Authentication
A
- Can be mobile users, or temporary users
- Generally 2 ways to authenticate: PSK or 802.1x
12
Q
PSK
A
- Pre-shared key / shared password
13
Q
802.1X
A
- Provides centralized authentication
- used in corporations, ask to connect to a centralized network and then you must authenticate
- vs PSK
14
Q
Open System
A
- no password required
15
Q
WPA3- Personal
A
- WPA3- PSK
0 wPA3 with a preshared key - everyone uses the same key
- unique wpa3 session key is derived from the PSK using SAE