Wireless security Flashcards

1
Q

What is a MIC ?

A

Message integrity check.

Verifying the integrity of a wireless communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a WAP?

A

Wireless access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which security services and which encryption modes are used in WPA2 and WPA3?

A

WPA2 over CCMP offers encryption(confidentiality) via AES and integrity(MIC) via CBC-MAC

WPA3 offers stronger encryption than its predecessor using GCMP block cipher mode, and confidentiality with AES encryption, and a message integrity check(MIC) with GMAC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference in authentication process between WPA2 and WPA3 that makes WPA3 more secure?

A

WPA2 has a PSK brute-force problem. Attackers can listen to the four-way handshake and capture the hash of the pre-shared-key(PSK) and from there brute force what it is from that hash.

WPA3 changes the PSK authentication process by adding mutual authentication so you are both authenticating with the access point, and the access point is also authenticating with you.
It also doesn’t send a hash over the network and creates a sharked session key without sending that key across the network. It also adds perfect forward secrecy which means that the session keys are created for sessions only and then thrown away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SAE? (simultaneous authentication of equals)

A

Think of WPA3 when you see this.
This is a way of generating session keys that are used on both ends of a conversation without actually sending that key across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two most common ways of authenticating to a wireless network and what is the difference between them?

A

PSK and 802.1x
PSK is a shared password/pre shared key that everyone has to have/know in order to authenticate to the network.
802.1x is a centralized authentication so that everyone doesn’t have the same shared password to authenticate to a network. Users will be authenticated individually with an authentication server and unique credentials (i.e., RADIUS,LDAP,etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a captive portal?

A

A captive portal is the thing you would find in a hotel at the UNF library or in a coffee shop.

When you connect to the network your browser will load a login screen where you are asked to authenticate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WPS?

A

Wifi protected setup.

this is meant to be an easy way for a mobile device to connect to a network.
It can use NFC, maybe pushing a button on the access point, or maybe a pin configured on the access point that you need to enter on the mobile device.

You don’t need to set up 802.1x or anything else you could just simply use one of these to allow access to a network.

WPS is inherently very insecure, it was built wrong from the beginning.
If you are using a pin, it is 7 digits, so only 10,000,000 different combinations and be brute forced extremely easily.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is EAP?

A

Extensible authentication protocol
This is an authentication framework that is the framework for a lot of different authentication protocols.
We commonly see EAP used in conjunction with 802.1x authentication. You will be prompted for your authentication details and the EAP framework will be used to provide the authentication confirmation behind the scenes.
When you connect to a network the authenticator will send you an EAP request to authenticate and your credentials will be sent over EAP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is 802.1x?

A

802.1X is a way of configuring authentication on a network.
this is port-based network access control(NAC)
You don’t get access to the network in any way until you authenticate.
Used together with an access database (RADIUS, LDAP, TACACS+)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In authentication using 802.1x what are the three peices of the puzzle that are used to authenticate?

A

There is the Supplicant - the client
There is the Authenticator - the device that provides access
There is the Authentication Server - Validates the client credentials and stores valid credentials

For authentication servers think LDAP, RADIUS, TACACS+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is EAP-faSt

A

EAP secure
I put emphasis on the “S” in fast to avoid confusion about it being faster. It is really EAP-FAST
Stands for EAP Flexible Authentication via Secure Tunneling
Uses TLS to encrypt the communications.
Needs a RADIUS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is PEAP?

A

Protected EAP
PEAP is another solution to keeping authentication secure and encrypted(other than EAP-FAST)
This also uses TLS to create a secure tunnel for EAP.
Uses a digital certificate.
Clients don’t need individual certificates. Authentication server has a the digital certificate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is EAP-TLS?

A

EAP Transport Layer security.
Similar to other secure authentication protocols but in this instance the authentication server(RADIUS,LDAP,etc) needs a digital certificate as well as ALL other devices authenticating.

Uses a TLS tunnel.
This needs a PKI infrastructure because it is incredibly complicated to keep a certificate on every device and revoke and deploy them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is EAP-TTLS

A

EAP Tunneled Transport Layer Security
This is another EAP secure protocol.
This does not require a digital certificate to be on every single device, instead one is only needed on the AS.
A TLS tunnel is built using this digital certificate.

Once this TLS tunnel has been built we can use any authentication protocol inside of it such as other EAPs, MSCHAPv2, anything else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is RADIUS federation?

A

This is a way of combining RADIUS authentication (802.1x and EAP) to provide federation.
Remember federation? Like “sign in with google”

Allows members of one organization to authenticate to the network of another organization.

17
Q

What is a site survey?

A

This is performed before installing a wireless network to understand more about the wireless infrastructure that is already in place.
There may already be existing access points nearby (you may not control all of them)
We may have to work around existing frequencies and layout and plan for interference.

A heat map is a normal step here to figure out where the strongest and weakest wireless signals are in an area.

18
Q

What is a wireless controller?

A

This a centralized management device used to configure and manage all of the wireless access points that you have in your infrastructure.