Chapter 5: Protecting Wireless Networks Flashcards
802.11
1-2 Mbps
2.4 GHz
802.11a
54 Mbps
5 GHz
802.11b
11 Mbps
2.4 GHz
Wi-Fi!
802.11g
54 Mbps
2.4 GHz
802.11i
Provides for security enhancements, often referred to as WPA2
802.11n
Under the right conditions 600 Mbps, but realistically less
Can operate in both 2.4 GHz and 5 GHz
IV Attack
Attackers cracking the WEP initialization vector by examining its repeats
Temporal Key Integrity Protocol (TKIP)
Placed a 128-bit wrapper around the WEP encryption with a key
Wireless Markup Language (WML)
A smaller version of HTML used by WAP
Gap in the WAP
The security concern that exists when converting between WAP (Wireless Application Protocol) and SSL/TLS and exposing plain text.
WPA Features
- RC4 with TKIP
- Compatible with older devices
WPA2 Features
- CCMP
- Not compatible with older devices
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
128-bit AES encryption with a 48 bit initialization vector
Wireless Application Protocol (WAP)
A data transmission standard that is meant to be like TCP/IP for wireless devices.
Wireless TLS
- Provides authentication, encryption, and data integrity for wireless devices.
- Supports wireless devices that don’t have extremely powerful processors
Wireless Session Protocol (WSP)
Manages the session info and connection between the devices
Wireless Transaction Protocol (WTP)
Provides services similar to TCP and UDP for WAP
Wireless Datagram Protocol (WDP)
Provides the common interface between devices
Transceiver
Transmitter/receiver, AKA a wireless access point
What portion of the RF spectrum do wireless technologies use?
Microwave
All antennas are rated in terms of _______.
Gain value
Captive Portal
Requires users to agree to some condition before they use the network.
Extensible Authentication Protocol (EAP)
Provides a framework for authentication that is often used with wireless networks
Wi-Fi Protected Setup (WPS)
EAP message(s) that require some sort of authentication to join the network
Lightweight EAP (LEAP)
Requires mutual authentication, but is susceptible to dictionary attacks
Protected EAP (PEAP)
Replacement of LEAP that establishes an encrypted channel between server and client
Cloaking
Turning off the SSID broadcast on a WAP
Rogue Access Point
An access point added to your network that has not been authorized
Evil Twin
A rogue access point that poses as a legit access point
Bluejacking
Sending of unsolicited messages (spam) over a Bluetooth connection
Bluesnarfing
Gaining unauthorized access through a bluetooth connection