Wireless Security Flashcards
Jamming
Wireless network overwhelmed with traffic
SSID
Service Set Identifier
Open Key
Authentication to WiFi if any client knows correct SSID
Shared Key
Authentication where client and access point share a pre-shard key
PSK
Pre-Shared Key
WEP
Wired Equivalent Privacy
Encrypts and decrypts wireless data packets
RC4 encryption algorithm
Weak security system
WPA
Wi-Fi Protected Access
RC4 encryption algorithm
TKIP
TKIP
Temporal Key Integrity Protocol
Generates sequence of WEP keys, rekeys every 10,000 packets, uses integrity value to ensure packets aren’t tampered with
WPA2
Wi-Fi Protected Access Two
AES for encryption
CCMP for key management
AES
Advance Encryption Standard
CCMP
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
EAP
Extensible Authentication Protocol
War Drive
Attackers search for locations with open wireless network to collect user data
War Chalk
Marks left for other hackers about the wireless vulnerabilities
BlueJacking
Sends unsolicited messages to other Bluetooth devices