Wireless Protocols (Memorize) Flashcards

1
Q

WPA

  • Type of protocol
  • Vulnerabilities
  • Crypto protocols
  • Mode
A
WPA
Wifi Protected Access
-A wireless security protocol
-Replacement for WEP
-Susceptible to PW cracking attacks
-Replaced by WPA2
-Uses TKIP (Temporal Key Integrity Protocol, vulnerable) or AES (strong) encryption
-WPA with TKIP vulnerable to replay attacks
  • Allows Pre-Shared Key Mode
  • User accesses network anonymously with PSK or passphrase
  • Does not authenticate - authorization only
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WPA2

  • Type of protocol
  • Type of encryption
  • Mode
A
WPA2
Wifi Protected Access
-A wireless security protocol
-CCMP (Counter Mode Cipher Block Chaining) encryption, based on AES
-Allows Pre-Shared Key Mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PSK

  • What uses
  • Which part of AAA?
A

Pre-Shared Key Mode

  • WPA and WPA2 can operate in this mode
  • User accesses network anonymously with PSK or passphrase
  • Does not authenticate - authorization only
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Enterprise Mode

A
  • Forces users to authenticate (password or certificate)
  • 802.1X server, often RADIUS
  • To enable enterprise mode on router: enter RADIUS server & RADIUS port & shared secret
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

EAP

  • What kind of protocol
  • What does it do
  • What crypto protocol uses?
  • What wifi security standards use?
A

EAP
Extensible Authentication Protocol
-A wireless authentication protocol
-Secure encryption key used to encrypt all data transmitted between devices
-TKIP and CCMP (more secure) use this key
-WPA and WPA2 use five EAP types for authentication: EAP-FAST, EAP-TLS, EAP-TTLS, PEAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

EAP-FAST

A
EAP-FAST
EAP Flexible Authentication via Secure Tunnel
-A wireless authentication protocol
-Cisco's replacement for LEAP
-Supports optional certificates
-Lightweight and secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EAP-TLS

A
EAP-TLS
EAP-Transport Layer Security
-A wireless authentication protocol
-Requires certificate on 802.1X server AND each wireless client
-Strong security, wide adoption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EAP-TTLS

A
EAP-TTLS
EAP-Tunneled TLS
-A wireless authentication protocol
-TLS tunnel
-Extension of PEAP
-Requires certificate on 802.1X server, NOT clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PEAP

A

PEAP
Protected Extensible Authentication Protocol
-A wireless authentication protocol
-Protected PEAP
-Encapsulates and encrypts EAP conversation in TLS tunnel
-Requires certificate on server, not clients
-Microsoft CHAPv2 is implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TKIP

A

TKIP
Temporal Key Integrity Protocol, vulnerable
-Legacy wireless security protocol
-CCMP is the replacement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CCMP

A

CCMP
Counter Mode Cipher Block Chaining Message Authentication Code Protocol
-The best encryption protocol to use with WPA2
-Uses AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly