WLAN Security Flashcards
802.11 Security Basics?
Data Privacy
Authentication, Authorization, And Accounting
Segmentation
Monitoring and Policy
Data Privacy?
Encryption
- RC4 Cipher
- AES (Advanced Encryption Standard)
MAC Service Data Unit
(AAA)?
Authentication
Authorization
Accounting
Authentication?
Identify and Credential Verification, who and what?
Authorization?
Granting Access,
What can you do?
Accounting?
Tracking the use of resources
Rule of AAA?
Authentication is required before association and authorization can be allowed
Segmentation?
Based Upon Traffic Type
Based Upon Client Type
Based Upon Authentication or Authorization
LANs
WANs
VLANs
Monitoring
Monitoring gives vision into Network performance and Security
Monitoring may use?
WIDS
WIPS
Policy?
Policy defines how computer systems must be implemented
- Specific WiFi policies must be created
- Traditional wired policies are not sufficient
- Should be written and adaptable as technology changes
Legacy 802.11 Security?
Allows legacy client access
Uses older security measures
Is specified in the 802.11 standard as amended
Can be the weak spot of the network
Types of Security of 802.11
Legacy Authentication
Static WEP Encryption
MAC Filters
SSID Cloaking/Hiding
Legacy Authentication?
Open system or shared key authentication Wired Equivalent Privacy Pre-shared keys Weak when compared to more modern methods Still used for legacy devices
Open System Authentication?
Two way exchange between the client radio and the access point
- The client sends and authentication request
- The access point then sends an authentication response
Does not require any credential
Anybody can have association
Shared Key Authentication?
Four-way authentication frame handshake
Four-Way authentication frame handshake?
The client station sends an authentication request to the access point
The access point sends a cleartext challenge to the client station in an authentication response
The client station encrypts the cleartext challenge and sends it back to the access point in the body of another authentication request frame.
The access point decrypts the station’s response and compares it to the challenge text
Static WEP Encryption?
Uses a 24bit Initialization Vector
Can use either a 40 bit or 104 bit encryption key
WEP Provides?
Data Integrity
Confidentiality
Access Control
Data Integrity?
A data integrity checksum known as the integrity check value is computed on a data before encryption and used to prevent data from being modified
Confidentiality?
The primary goal of confidentiality was to provide data privacy by encrypting the data before transmission
Access Control?
For WEP this is a crude form of authorization
Client stations that do not have the same matching static WEP key as an access point are refused to access to network resources
WEP Encryption Process?
RC4 - Rivest Cipher
WEP Weaknesses?
IV Collisions Attack
Weak Key Attack
Reinjection Attack
Bit-flipping Attack
Easily cracked using freeware
Not allowed in CDE
Other Security Measures?
MAC Filters
SSID Cloaking
In and of themselves these measures are not sufficient
Can be a part of a layered approach
MAC Filters?
Block or Allow clients based upon MAC Address
Easily Bypassed through spoofing
Time consuming to implement
Does not scale well