CWSP 206 Flashcards
1
Q
Authentication
A
- Authentication is the first of two steps required to connect to a 802.11 BSS
- Both Authentication and Association must occur, in that order, before a client can pass traffic on a 802.11 BSS
- Authentication happens at Layer 2 of the OSI model
2
Q
Open System Authentication
A
- Open System Authentication is the only pre-RSNA security mechanism that has not been deprecated
- Clients authenticate w/o the need of verification
- Uses a 2 frame management exchange
- Authentication result is called a “null authentication”
3
Q
WEP
A
- WEP (Wired Equivalent Protocol) is an optional method that can be used w/ Open System Authentication
- Not designed for authentication, but rather to provide data privacy
- WEP is a Layer 2 encryption method that uses ARC4 streaming cipher
- WEP is only used to encrypt layers 3 - 7 (MSDU - MAC Service Data Unit) of the OSI model
- WEP encryption had three goals of:
Confidentiality
Access Control
Data Integrity
4
Q
IV Collisions Attack
A
- IV (Initialization Vector) collision attacks is considered one of WEP’s weaknesses
- The 24-bit IV is in cleartext and a new IV is generated for every transmitted frame
- If WEP is used for the WLAN, and the WEP-encrypted network is busy an IV Collision can occur due to the limited size of the IV (24-bit)
- An attacker can recover the secret key being used to encrypt the data
5
Q
Weak Key Attack
A
- Weak key attacks are another known as another weakness of WEP-encrypted networks
- Because of ARC4 key-scheduling algorithm, weak IV keys are generated
- Attackers can recover the secret key much easier
6
Q
Reinjection Attack
A
- Reinjection attacks are a weakness of WEP-encrypted networks
- Tools for hackers exist that implement a packet reinjection attack to accelerate the collection of weak IVs on a network with little traffic
7
Q
Bit-Flipping Attack
A
- Bit-Flipping attacks are a weakness of WEP-encrypted networks
- The ICV data integrity check is considered weak and WEP-encrypted packets can be tampered with
- WEP cracking tools use a combination of reinjection, weak key, and IV collision attacks
8
Q
TKIP
A
- Temporal Key Integrity Protocol is a layer 2 security protocol that was created to replace WEP
- TKIP uses the RC4 algorithm for encryption and decryption
- TKIP adds 20 bytes of overhead to an 802.11 data frame totaling up to 2324 bytes
- TKIP uses dynamically created encryption keys as opposed to statics keys used via WEP
- Uses a 4-way handshake
- TKIP was designed to defeat replay attacks
- TKIP can either be a Pairwise Transient Key (PTK) or a Group Temporal Key (GTK)
- TKIP has been deprecated even though it’s defined in the 802.11-2012 standard due to security risks
9
Q
Shared Key Authentication
A
- Shared key authentication uses WEP to authenticate client stations and requires a static WEP kep be configured on both the client and AP
- Authentication will NOT work if WEP keys are a mismatch on either side
- Shared key authentication is a four-way frame exchange
10
Q
Symmetric Algorithm
A
- When using a symmetric algorithm, the key used to encrypt the plaintext is the same key used to decrypt the ciphertext
- WEP, TKIP, and CCMP are all methods that use symmetric algorithms
- Symmetric algorithms require less CPU power than asymmetric
11
Q
Asymmetric Algorithm
A
- Asymmetric algorithms used a pair of keys. One key is used for encryption while another key is used for decryption
- The key used for decryption is also known as the private key
- The key used for encryption is known as the public key
12
Q
Stream Cipher
A
A stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudorandom cipher bit stream called the keystream
13
Q
Block Cipher
A
- A block cipher is a symmetric key cipher where plaintext bits are combined in blocks of data
- Example: RC4/RC5/DES/3DES/AES
14
Q
WLAN Encryption Methods
A
- Encryption methods for WLAN are defined at L2
- Also known as MPDU (MAC Protocol Data Unit)
- The encryption will make the cipher text portion (MSDU) or MAC Service Data Unit and encapsulate it with the MAC and FCS
15
Q
MIC
A
- Message Integrity Code
- Also known as “Michael” and is considered as a integrity protocol used with TKIP
- Designed to stop bit-flipping, redirection, or impersonation attacks
- 8 bytes in size and appended to the end of the MSDU
16
Q
TKIP MPDU
A
- First 32 bytes are the MAC header
- The encrypted frame is made up of the following:
Initialization Vector (IV)/Key ID - 4 bytes
Extended IV - 4 bytes
MSDU payload - 0 - 2304 bytes
MIC - 8 bytes
ICV - 4 bytes
17
Q
CCMP
A
- CCMP operates at layer 2 of the OSI model and uses AES cipher for encryption
- Counter Mode with Cipher-Block Chaining Message Authentication Code Protocol
- Part of the 802.11i amendment to replace TKIP and WEP
- CCMP is mandantory for a RSN (Robust Security Network)