1) Ad-hoc NW formation
2) Rogue AP’s
3) Client missassociations
4) Directed wireless network attacksWhat exactly is client missassociation?
An SSID profile is saved and active scanning is in operation, resulting in a client connecting to a network without knowingWhat are 4 examples of directed wireless network attacks?
1) DoS
2) Recon probes
3) Authent. penetration
4) MITM attacksHow are directed wireless network attacks most often mitigated?
By authenticating and encrypting management frames.What is this process of mitigation called exactly?
MFP: management frame protectionManagement frames are usually sent unauthenticated and unencryptedWhat does MFP do to management frames?
It digitally signs themThe two MFP modes are:
1) Infrastructure
2) ClientIn infrastructure MFP,
A hash is generated for every management frame and placed before the FCSClient MFP is only available with…
CCX 5+ “Cisco compatible extensions”What does Client MFP/CCX do to management frames
It uses 802.11i to encrypt mgmt frames between the client and the APWhat does Client MFP/CCX defend most effectively against?
MITM and DoS attacksIn Client MFP/CCX, a key is generated for each APWhy can’t mobile devices associate with MFP LAN’s?
They don’t have the processing power required for the extra encryption/authentication techniques2 older security methods are:
1) SSID —> wrong SSID? no association
2) MAC authenticationWhat is open authentication?
It means no authentication key is requiredWhat is the 4 step process to open authentication?
1) Probe
2) Probe response
3) Auth
4) Auth responseIn WEP authentication, a ____ key is used to encrypt traffic
WEP keyIn WEP, the header is not encrypted is not encrypted, but the the data is isWhat encryption type does WEP use?
RC4What are the 3 different sizes for WEP keys?
40 bits
104 bits
128 bitsIn WEP, every key is combined with an….
Initialization vectorWhat is the basic process of WEP association?
1) Auth request
2) Challenge text packet
3) Challenge text encrypted by supplicant
4) If AP able to decrypt properly supplicant has the right keyEAP is defined under which two RFC’s?
2284, and 3748EAP usually works alongside..
802.1x or RADIUSThe 4 EAP message types are
1) Request — to supplicant
2) Response — from supplicant
3) Success
4) FailureWhat is Cisco LEAP?
A proprietary username/PW based auth. system between a client and a RADIUS serverWhat is Cisco LEAP’s weakness?
Susceptible to eavesdroppingEAP-TLS is defined under…
RFC 2716EAP-TLS uses… _________ for authentication
Digital certificatesEAP-TLS uses…__________ to secure communications between client and RADIUS server
PKIIn EAP-TLS, the ________ and __________ authenticate to eachother
client and serverWhat is TLS based on?
SSL 3.0What did EAP-TTLS add to EAP-TLS?
TunnelingPEAP is very similar to..
EAP-TLSWhat are the 3 authentication options for PEAP?
1) EAP-MSCHAP V.2
2) EAP-GTC
3) EAP-OTPWhat is fast-reconnect?
Roaming b/t AP’s made seamless b/c TLS session ID’s are cached by WLCThe 3 roles of the 802.1x framework are…
1) Supplicant
2) Authenticator
3) Authentication serverIt can be said that the authenticator controls __________ access to the network
PhysicalIf a Cisco ACS is being used as the Authentication server, more _____________ methods of authentication are available
Diverse802.1x: After the client sends a probe request to the AP, the AP will respond with a…
AP probe response which contains sec params.What happens after the AP sends its probe response?
The client is associated but traffic is blocked until 802.1x auth is completeThe 802.1x authentication challenge is encrypted by
EAPHow does the client response to this challenge?
With a credential responseWhat does authenticator do with the credential response?
Converts it to a RADIUS access request and sends it to the ASWhat does the AS do upon receiving the RADIUS access request?
It responds with a challenge that specifies what credentials are required of the supplicantWhat happens if the client responds with the correct credentials?
The AS transmits a success message and encryption keyWPA2 is aka
802.11iWhat is a PMK?
Pairwise master key,
It is created on a RADIUS server when a client authenticatesWhere is the PMK sent?
From the AS to the authenticatorWhat is PMK used for?
To encrypt the exchange of the temporal session keyWhat is the PMK derived from that results in the authenticator and supplicant having the same one?
It is derived from client informationPMK’s are used to make PTK’s and GTK’s.PTK’s and GTK’s are made in a
4 way handshake processWPA2-PSK is aka
personal modeWPA2-PSK is encrypted with…
A 256 bit PMK
Aucun commentaire:
Enregistrer un commentaire