4.2 Explain Authentication and Access Controls Flashcards
1
Q
WPA
A
- WPA is considered exploitable and is no longer used for wireless security. A common exploit used against WPA is an attack on the helper protocol of Wi-Fi Protected Setup (WPS).
- WPA uses 256-bit keys
- operates in two modes of preshared key (PSK),
- PSK is the most common, because it can easily be implemented.
- Enterprise mode requires a certificate server infrastructure and is also called WPA-802.1x. Enterprise mode uses the 802.1x protocol, RADIUS, and EAP; it is often used in corporate environments.
2
Q
WPA2
A
- 802.11i
Uses personal and enterprise mode - Uses AES. AES is more secure than RC4 plus TKIP.
- Also exploitable if WPS service is enabled (WPS needs to be off).
3
Q
Kerberos
A
- Secure authentication protocol.
- 3DES Triple data encryption AND AES (Advanced Encryption Standard).
- Main authentication protocol for Windows Active Directory.
- Three-way trust to authenticate users and machines.
4
Q
LDAP
A
LIghtweight Directory Access Protocol.
Open standard directory service protocol.
Uses client-server protocl for looking up objects in a directory service and their respective attributes.
- LDAP adopted by microsoft for AD lookups of objects and domain controllers.
5
Q
Certificates
A
Use of public key infrastructure (PKI) to validate users, computers, and applications. Even works on some IOT devices.
Remember diagram.