Chapter 5: Protecting Wireless Networks Flashcards
802.11<i>x</i> Protocols
170
- 11- 1 or 2 Mbps at 2.4 GHz
- 11a- 54 Mbps at 5 GHz
- 11b- 11 Mbps at 2.4 GHz
- 11g- 54 Mbps at 2.4 GHz
- 11i- security updates, particularly to authentication
- 11n- up to 600 Mbps at 5 and 2.4 GHz
* 802.11ac- up to 1 Gbps at 5 GHz
* 802.11ad- up to 7Gbps at 60 GHz
* **The 60 GHz band is also more secure due to a smaller radius of signal propagation
Wired Equivalent Privacy (WEP)
171
Legacy wireless security that can be cracked in 5 minutes. TKIP was introduced to make it much more secure, but that has long since been broken.
Wireless Application Protocol (WAP)
172
used for ancient wireless devices. Uses WML for webpage display.
Sometimes the connection between the WAP server and the internet wasn’t encrypted, which created security risks.
Wi-Fi Protected Access (WPA)
172
Created to implement the 802.11i standard. WPA2 takes care of all of it, while WPA only lives up to some of it.
WPA uses TKIP, and WPA2 uses CCMP
Wireless Transport Layer Security (WTLS)
173
Security for WAP.
Similar to TLS, but considerably less powerful.
Security levels in WAP
174
<b>A</b>nonymous authentication
-Anyone can connect to the web portal
<b>S</b>erver Authentication
-You must authenticate against a server
<b>T</b>wo-way (client server) authentication
-The server must authenticate with the client must authenticate with the server.
Technologies used to communicate between WAP device and server
175
<b>W</b>ireless Session Protocol (WSP) -Session information and connection <b>W</b>ireless Transaction Protocol (WTP) -Similar in function to TCP and UDP <b>W</b>ireless Datagram Protocol (WDP) -Common interface between devices
Captive Portals
180
When you have to agree to terms and conditions in order to access the internet. An example of this would be at Starbucks.
Extensible Authentication Protocol
181
Framework of authentication for wireless networks.
The important ones are LEAP and PEAP.
It’s used for WPS, which is terrible.
Lightweight EAP
182
LEAP is Cisco proprietary and is being phased out. It requires mutual authentication, but it’s susceptible to dictionary attacks.
Protected EAP
182
PEAP was developed by Cisco, RSA, and Microsoft. It has native support in Windows (starting with XP), and has replaced all former versions of EAP.
Site Survey
185
You listen to a wireless network and you can see information about the network, including what systems are in use and which protocols they’re using.
War Driving
185
Driving around in search of wireless access points that are either unrestricted or easily hacked.
War Chalking
185
Writing on a wall, on the street, on a sign, etc. information about a wireless access point you’ve jumped on to
Blue Jacking
187
Spam over Bluetooth. It’s annoying, but mostly harmless.