Chapter 8
EAP (Extensible Authentication Protocol)
A framework for transporting the authentication protocols. Defines message format by using four types of packets: -Request -Response -Success -Failure
Media Access Control (MAC) address filtering
A method for controlling access to a WLAN based on the device's MAC address. Permits or block devices based on MAC address.
Wired Equivalent Privacy (WEP)
An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. It encrypts plaintext into ciphertext.
Wi-Fi Protected Setup (WPS)
An optional means of configuring security on wireless local area networks. Two common WPS methods: Pin method and Push-button method.
Rogue access point
An unauthorized access point that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks. Usually set up by an insider (employee)
Service Set Identifier (SSID)
The user-supplied network name of a WLAN. Usually broadcasted so that it is visible to any device.
WLAN (Wireless Local Area Network) attacks
a. Rogue access b. Evil twin access c. Wireless replay
Evil Twin Access Point
access point set up by an attacker that mimics an authorized AP and capture transmissions from users to evil twin AP
Wireless replay attack
also known as hijackings, the attacker captures transmitted wireless data, records it, and then sends it on to the original recipient without the attacker's presence being detected.
Bluesnarfing
an attack that accesses information from a wireless device through a Bluetooth connection. Often between cell phones and laptops, attackers can copy e-emails, contacts, or other data by connecting to the Bluetooth device without the owner's knowledge.
Bluejacking
an attack that sends unsolicited messages to Bluetooth-enabled devices. Considered more annoying than harmful and not data is stolen.
Wireless client network interface card adapter
antenna sends and receives signals through airwaves and performs same functions as wired adapter.
PSK (pre-shared key)
authentication for WPA
IEEE 802.1x
authentication used for WPA2. Originally developed for wired networks. Provides a greater degree of security by implementing port-based authentication. Blocks all traffic on a port-by-port basis until client is authenticated
Fat vs. Thin (ap type)
autonomous APs have the intelligence required to manage wireless authentication, encryption, and other functions for the wireless devices they serve (called Fat APs) "Lightweight" APs do not contain all the management and configuration functions found in Fat APs; thus, they are called Thin APs.
Wired Equivalent Privacy (WEP) vulnerabilities
can only use 64-bit or 128-bit number to encrypt. Initialization vector (IV) is only 24 of those bits, shorter length makes it easier to break. It also violates cardinal rule of cryptography (avoid a detectable pattern)
Standalone vs. Controller APs
controller APs can be managed through a dedicated wireless LAN controller (WLC). The WLC is the single device that can be configured to automatically distribute setting to all controller APs. Provides tools for monitoring the environment and offering information regarding the best locations for APs, wireless AP configuration settings, and power settings.
CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol)
encryption for WPA2
TKIP (Temporal Key Integrity Protocol)
encryption used in WPA. Uses a longer 128 bit key than WEP, dynamically generated for each new packet. Includes a Message Integrity Check (MIC), designed to prevent man-in-the-middle attacks.
Institute of Electrical and Electronics Engineers (IEEE)
established in 1884, an organization that for networking and wireless communication and develop network architecture standards. IEEE 802.11 - standard for wireless local area networks (WLANs) IEEE 8002.11n - improves speed, coverage area, and resistance to interference and strong security IEEE 8002.11ac- ratified in 2014 and has data rates over 7 Gbps.
Bluetooth piconet
establishes when a Bluetooth device comes within range of another. One device (master) controls all wireless traffic and the other device (slave) takes commands.
Network Hard edge
in a LAN network, it's a well-defined boundary that protects data and resources(wired).
WiFi Protected Access (WPA)
introduced in 20003 by the Wi-Fi Alliance. Encryption for WPA is accomplished by using Temporal Key integrity Protocol (TKIP)
Rouge AP system detection
probes that monitor the airwaves for traffic. Once a suspicious signal is detected by a wireless probe: The information is sent to a centralized database where WLAN management system software compares it to a list of approved APs. Any device not on the list is considered a rogue AP
WPA2 (Wi-Fi Protected Access 2)
second generation of WPA. Has tow mode: Personal and Enterprise.
Network Blurred edge
the introduction of WLANs in enterprises has changed hard edges to blurred edges (wireless)
Captiva Portal APs
users a standard web browser to provide information. Gives the wireless user the opportunity to agree to a policy or present valid login credentials
Bluetooth
wireless technology that uses short-range radio frequency (RF) transmissions. A personal Area Network (PAN) technology, current version is Bluetooth 5 with a range of 800 ft (243 meter)