Wireless network hacking Flashcards
WEP
Calculates 32-bit integrity check value (ICV) appends this to the end of a data payload. then creates 24-bit IV (initialization vector) which is combined with a key and appended onto the end of the data stream. then input into a RC4 algorithm and encrypted with BLAH BLAH BLAH Key length 40/104
WPA
uses TKIP (128 bit key) and clients mac address for rc4 encryption. WPA changes the key out hence temporal. Keys are transferred back and forth through EAP. IV 48
WPA-2
AES encryption. WPA-2 Enterprise can include EAP or a RADIUS server into the autentication side of WPA2 allowing Kerberos ticketing. Uses CCMP to show message hasn’t been changed during transport (MIC Message integrity check includes sequence #). WPA personal just uses a PSK IV 48
KIsmet
Passive, Can detect points that have not been configured (some default passwds) and determine encyption types. more of wire sniffer can do discovery.
802.11a
op speed 54 mbps 5ghz 95 feet
802.11b
op speed 11 mbps 2.4ghz 150 feet
802.11g
op speed 54 mbps 2.4ghz 170 feet
802.11n
op speed 100+ mbps 2.4-5ghz 230 feet
802.11ac
op speed 1000 mbps (1.33 gb) 5ghz 230 ft
BSSID
mac address of the wireless access point
Honeyspot
creating evil twin of well known ap (McDonald’s)
MAC spoofing tools
SMAC, TMAC
Cain and Abel method to crack WEP
Statistical measures and the PTW technique
AircrackNG method for cracking WEP
PTW, FMS, Korek or dictionary
AirCrackNG method for cracking WPA and 2
Dictionary