Wireless Infidelity II Flashcards
Three tiers of wireless basic service sets (BSSs) were described in the article. Name two of them:
Independent BSS & Extended Service Set
In this mode, a WAP broadcasts its SSID.
open mode
In this mode, a WAP will not broadcasts its SSID.
closed mode
In this mode, a network interface card (NIC) will capture all traffic on a network with which it is associated
promiscuous mode
In this mode, a network interface card (NIC) will capture all traffic on a frequency irrespective of whether it is associated with the source
monitor mode
What is the key flaw in the WEP protocol?
The implementation of the RC4 symmetric stream cipher algorithm
The article describes four examples of the flawed implementation of RC4 in WEP. List 3.
(1) IV is always prepended to the key prior to generation of the key stream
(2) IV is relatively small (3 bytes)
(3) IV’s may be used to betray information about the key
What are the two key lengths allowed by WEP?
40-bit & 104-bit