Wireless Security Flashcards
1
Q
WPA
A
- Wi-fi Protects Access
- Designed to fix critical vulnerabilities in WEP (Wired equivalent privacy) Standard
- Uses RC4 stream cipher to encrypt traffic, but add TKIP (Temporal Key Integrity protocol) to mitigate types of attacks again WEP
- Neither WPA or WEP are secure enough to be used anymore
2
Q
WPA2
A
- Used AES ( Advanced Encryption standard) and CCMP (Chaining Message Authentication Code Protocol)
- AES replaced RC4 and CCMP replaced TKIP
- Weaknesses have been found in WPA2 which led to WPA3
3
Q
PSK
A
Pres-Shared Key
- Means of personal wi-fi authentication
- Uses passphrase to generate key that is used to encrypt communications
- Group authentication
- Admin configures passphrase of between 8 and 63 characters
- This is converted to type of hash value PMK (pairwise master key)
- Same secret must be configured on APs and nodes
- All types of PSK authentication are vulnerable to attacks that attempt to recover passphrase
- Should be at least 14 characters long to mitigate cracking risk
4
Q
WPA3 Personal Authentication
A
- Uses PAKE (Password Authentication Key Exchange)
- SAE (Simultaneous Authentication of Equals) protocol replaces 4 way handshake
5
Q
WPA Enterprise Authentication
A
- Use 802.1X and EAP to authenticate against network directory
- EAPoW (EAP over Wireless) forward authentication data without allowing other types of network access
- WPA2 or 3 Enterprise
- When association is requested, AP allows EAPoW traffic only
- Passes credentials to AAA(Radious or TACAS+) server for validation.
- Upon authentication, MK (Master key) is transferred to supplicant
- PMK is generated by both and then four-way handshake or SAE is used to creat session keys
6
Q
Encryption Protocol Mismatch
A
- Connections will fail even if correct credentials are supplied
- Check that client can support encryption and authentication standards configured on AP
- Driver or OS updates may be needed
7
Q
Disassociation Frames
A
- Notifies other parties that connection has ended
- Possible indicator of malicious attack
8
Q
Open Authentication
A
- Client is not required to authenticate
- Used for Public APs or hotspots
- For WPA/WPA2 data is unencrypted
- Can be combined with captive portal or splash page
9
Q
Captive Portal issues
A
- Arise when redirection does not work
- Portal should use HTTPS
- Most modern browsers block redirection to sites without TLS
- Portal also need to be installed with digital certificate by Certificate authority that is trusted by browser