6 Flashcards
What encryption mode does CCMP use?
WPA2
What encryption mode does TKIP use?
WPA
What is the process of personal authentication?
1.
2.
3.
4.
A PMK is created by creating a PSK(passphrase) combining that with the clients SSID. Then putting that values through a SHA-1 hash 4096 times, thus creating a PMK
The master key is then created by adding the Client and AP’s MAC
Starting the 4-way handshake, The server sends the ANONCE sending tit too the client, Client creates a SONCE sending it and both adding both values to the PMK creating the PK which is used to encrupt and decrypt unicast traffic.
Both sending a GTK as the final step
What are the characteristics of a personal authentication?
vulnerable to dictionary attacks
if key is found can decrypt all traffic for 1 user during that one session
AUTH:PSK
What is the process of enterprise
- 802.1X EAP is sent as PMK
- 4 way handshake
pmk+ClientMAC+APMAC
pmk+ClientMAC+APMAC+AONCE(SERVER)
pmk+ClientMAC+APMAC+AONCE(SERVER)+SONCE(CLIENT
= PK (decrypts/encrypts all traffic)
GTK >
What are the characteristics of a Enterprise authentication?
Auth MGT
Not vulnerable too dictionary attacks
if key is found can decrypt all traffic for 1 user during that one session
What are the characteristics of WPA3
- Stronger/More Secure connection (SAE)
- Stronger Encryption (GCMP-256G)
-802.11w mandatory (PMF)
What are the characteristics of Dragonfly Key Exchange?
Same as SAE
Uses ECC to create PMK
Creates a Passkey too be used to join the network
Not vulnerable to dictionary attacks
What is the vulnerability of WPA3, and the attack used too exploit it?
Transitional mode: backwards compatibility for WPA2 bringing its vulnerabilities
Dragon blood attack: a Downgrade attack to WPA2
_____________ provides eavesdropping protection for an open and public WPA3 network
If no ___________ is assigned it is vulnerable to Man in the middle attacks
Wifi certified enhanced open
passphrase