6 Flashcards

1
Q

What is the purpose of Wi-Fi Protected Access 3 (WPA3)?

A

WPA3 was introduced as a security protocol to replace WPA2, addressing the vulnerabilities associated with its predecessor. It enhances security features and introduces improvements such as per-user encryption and resistance against brute force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was the vulnerability associated with WPA2 known as KRACK, and how did it exploit the four-way handshake?

A

The KRACK exploit targeted the third message of the WPA2 four-way handshake, allowing attackers to force devices to reinstall the encryption key and reset the Nonce, ultimately leading to key decryption and potential data interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is SSL Strip, and how does it relate to WPA2 vulnerabilities?

A

SSL Strip is a man-in-the-middle attack tool used to force communication between a victim and a network adversary in plain text over HTTP, allowing the attacker to intercept and modify HTTPS content. It exploits vulnerabilities in WPA2 to decrypt and manipulate data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Simultaneous Authentication of Equals (SAE), and how does it improve security in WPA3?

A

SAE is a variant of the Dragonfly key exchange protocol implemented in WPA3 Personal. It replaces the pre-shared key (PSK) used in WPA2 with a more secure authentication method, enhancing protection against offline dictionary attacks and improving overall security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is DragonBlood, and what vulnerabilities does it expose in WPA3?

A

DragonBlood is a security vulnerability discovered in WPA3 that exposes the protocol to various attacks, including security group downgrade attacks, timing-based and cache-based side-channel attacks, and denial of service attacks. This vulnerability undermines the security improvements introduced by WPA3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What was the main improvement introduced by WPA3 over its predecessor, WPA2?

A

WPA3 introduced a more secure handshake protocol, Simultaneous Authentication of Equals (SAE), to replace the pre-shared key (PSK) used in WPA2. This enhanced security by protecting against offline dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does WPA3 mitigate the vulnerabilities exploited by SSL Strip in WPA2?

A

WPA3 enhances security by introducing per-user encryption and resistance against brute force attacks. Additionally, WPA3 replaces the pre-shared key (PSK) with the more secure Simultaneous Authentication of Equals (SAE) protocol, reducing the risk of man-in-the-middle attacks like SSL Strip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of the Dragonfly key exchange protocol in WPA3?

A

The Dragonfly key exchange protocol, also known as Simultaneous Authentication of Equals (SAE), is used in WPA3 to provide secure authentication between devices on a wireless network. It protects against offline dictionary attacks and enhances security compared to pre-shared key (PSK) methods used in previous protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the commit phase in the Dragonfly key exchange protocol?

A

The commit phase is the initial stage of the Dragonfly key exchange protocol in WPA3. During this phase, both parties agree on a single guess of the password used for authentication. This commitment sets the stage for further authentication and key agreement in the confirm phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the two message exchanges involved in the Dragonfly Key Exchange protocol?

A

The two message exchanges in the Dragonfly Key Exchange protocol are the commit exchange and the confirm exchange. During the commit exchange, both parties commit to a single guess of the password, while the confirm exchange involves confirming that both parties know the password, establishing secure authentication and key agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly