6 Flashcards

1
Q

What encryption mode does CCMP use?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What encryption mode does TKIP use?

A

WPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the process of personal authentication?
1.
2.
3.
4.

A

A PMK is created by creating a PSK(passphrase) combining that with the clients SSID. Then putting that values through a SHA-1 hash 4096 times, thus creating a PMK

The master key is then created by adding the Client and AP’s MAC

Starting the 4-way handshake, The server sends the ANONCE sending tit too the client, Client creates a SONCE sending it and both adding both values to the PMK creating the PK which is used to encrupt and decrypt unicast traffic.

Both sending a GTK as the final step

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the characteristics of a personal authentication?

A

vulnerable to dictionary attacks
if key is found can decrypt all traffic for 1 user during that one session
AUTH:PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the process of enterprise

A
  1. 802.1X EAP is sent as PMK
  2. 4 way handshake
    pmk+ClientMAC+APMAC
    pmk+ClientMAC+APMAC+AONCE(SERVER)
    pmk+ClientMAC+APMAC+AONCE(SERVER)+SONCE(CLIENT
    = PK (decrypts/encrypts all traffic)
    GTK >
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the characteristics of a Enterprise authentication?

A

Auth MGT
Not vulnerable too dictionary attacks
if key is found can decrypt all traffic for 1 user during that one session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the characteristics of WPA3

A
  • Stronger/More Secure connection (SAE)
  • Stronger Encryption (GCMP-256G)
    -802.11w mandatory (PMF)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the characteristics of Dragonfly Key Exchange?

A

Same as SAE
Uses ECC to create PMK
Creates a Passkey too be used to join the network
Not vulnerable to dictionary attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the vulnerability of WPA3, and the attack used too exploit it?

A

Transitional mode: backwards compatibility for WPA2 bringing its vulnerabilities

Dragon blood attack: a Downgrade attack to WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_____________ provides eavesdropping protection for an open and public WPA3 network

If no ___________ is assigned it is vulnerable to Man in the middle attacks

A

Wifi certified enhanced open

passphrase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly