WiFi and Cloud Security Flashcards
What is WPA?
Wired Equivalent Privacy.
Used Rivest Cipher4(RC4) which had key size of 40 to 256 bits.
What did WPA have a problem with?
Forgeries
What was developed to strengthen WPA?
WEP: Wifi protected Access
TKIP: Temporal Key Integrity Protocol
What did WPA2 allow for the use of?
Stream Cipher (AES CCMP) for encryption so required dedicated hardware.
Why was TKIP used?
Backward compatibility by using a MIC.
MIC and Authentication allowed for the reduction of spoofing attacks.
What are the two modes of WPA2?
Personal
Enterprise
How does WPA2 Personal Work?
Uses a pre shared key and therefore doesn’t require separate user authentication.
How does WPA2 Enterprise work?
Uses EAP for authentication.
What is EAP?
Extensible Authentication Protocol.
Has multiple levels such as:
EAP-TLS,
EAP-TTLS (Tunneled TLS)
Protected EAP versions - some with token cards or an identity module.
How is WPA2 Personal authentication done?
Access Point generate a pre shared key from a plaintext password and shares it with the client.
How is WPA Enterprise authentcation done?
AP provides access control to the authentication server (RADIUS).
The AP has 2 logical ports, service and authentication (PAE).
Authentication port is always open and service is opened after successful authentication using EAPoL(EAP over LAN)
What is a PAE?
Port Access Entity
How does WPA2 KeyGen work?
2 sets of 2 handshakes to ensure fresh key generation and distribution.
4-Way handshake is for Pairwise Transient Key (PTK) and Group Transient Key (GTK).
How does the Four way handshake work for WPA2 KeyGen?
4 EAPoL messages sent between client and AP to confirm client knowns Pairwise Master Key.
PMK then is used to generate PTK which is fresh for each transaction
What are the vulnerabiltiies of WPA2?
Susceptible to DOS.
Deauthentication can happen by forcing the client to reauthenticate
Can spoof MAC Addresses
Disassociation when the client with multiple disassociate with some of them.