Hacking Wireless Networks Flashcards
A 32 bit identification string of the Access Point
Service Set Identifier (SSID)
SSID inserted into the ? of every ? packet
Header, data
MAC address of the Access Point
Basic Service Set Identifier (BSSID)
A frequency band dedicated to the Industrial, Scientific and Medical purpose
ISM Band
What does GSM stand for?
Global System for Mobile Communication
Name the generations of GSM
Generations: 2G (GSM), 3G (UMTS), 4G (LTE), 5G
Wi-Fi Wi-Fi is a local area networking technology based on what standard?
IEEE 802.11
Name the types of Wi-Fi authentication
Open authentication & Shared Key authentication
What is the purpose of the probe request?
The Probe Request is to discover the network
What does the probe response contain?
The Probe Response contains the parameters (SSID, data rate, encryption, …)
Name the request types associated with Wi-Fi Open System authentication
1 - Probe Request
2 - Open System Authentication Request
3 - Association Request
Name the 3 types of Wireless authentication
1 - Open Authentication - no auth
2 - Shared key - auth via shared key(password)
3 - Centralized - central auth ex. RADIUS
Name the 4 stages of Wi-Fi shared key authentication
Authentication Request
Authentication Response with Challenge Text
Encrypted Challenge Response
Successful / Unsuccessful response
Describe the shared key process and weakness
The client sends Authentication Request
The client encrypt the challenge test with his shared key
The AP decrypt the encrypted challenge test with his shared key, if the decrypted text matches, the successful authentication response frame is sent to the client
This challenge test can be captured by a hacker as a clear text, so the hacker can get the shared key
What does RC4 stand for?
RC4 - Rivest Cipher 4 Stream Cipher Algorithm
What does DSSS stand for?
Direct-Sequence Spread Spectrum (DSSS)
What kind of standard is IEEE 802.1X?
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC)
Does IEEE 802.1X provide for authentication?
Yes, It provides an authentication and access controls across wired and wireless networks
What is Direct-Sequence Spread Spectrum (DSSS)?
Combines all available waveforms into a single purpose
What does EAP stand for?
Extensible Authentication Protocol
What kind of framework is EAP?
an authentication framework frequently used in wireless networks and point-to-point connections
SSID and BSSID stand for what?
Service Set Identifier, Base Service Set Identifier
Name two types of Wireless Antennas
Directional & Omnidirectional
Name 3 types of Directional Antennas
Parabolic, Yagi-Uda, & Horn
What does FHSS mean?
Frequency-hopping spread spectrum (FHSS)
Name 3 types of Omnidirectional antennas
Whip, Rubber Ducky, & Monopole
Name 3 use cases for Omnidirectional antennas
radio broadcasting, cell phones, & GPS
What does WEP stand for?
Wired Equivalent Privacy (WEP)
Name the first wireless encryption standard
Wired Equivalent Privacy (WEP)
What type of attack was WEP designed to prevent?
Man-in-the-Middle attack
Describe Frequency-hopping spread spectrum (FHSS)
A method of transmitting radio signals by rapidly changing the carrier frequency among many distinct frequencies occupying a large spectral band.
What OSI layers is WEP used in?
Physical layer and Data Link layer
What does IV in WEP stand for?
Initialization Vector (IV)
How many bits long is the IV in WEP?
24-bits
How long is the WEP shared-secret key?
40-bits
How long is the WEP key after combining the IV and shared-secret key?
64 bits = 24 bit (IV) and 40 bits (shared-secret key)
What encryption algorithm does WEP use?
RCA RC4 PRNG algorithm
What does WPA stand for?
Wi-Fi Protected Access
How does TKIP make WPA better than WEP?
Temporal Key Integrity Protocol (TKIP) implements a key mixing function that combines the secret key with the initialization vector before passing it to the RC4 cipher. WEP, in comparison, merely concatenated the initialization vector to the root key, and passed this value to the RC4 routine.
WPA’s TKIP increased WEP’s 64 bit key to what bit-length?
128-bit