Flashcards in Chapter 5: Protecting Wireless Networks Deck (16)
802.11- 1 or 2 Mbps at 2.4 GHz
802.11a- 54 Mbps at 5 GHz
802.11b- 11 Mbps at 2.4 GHz
802.11g- 54 Mbps at 2.4 GHz
802.11i- security updates, particularly to authentication
802.11n- up to 600 Mbps at 5 and 2.4 GHz
*802.11ac- up to 1 Gbps at 5 GHz
*802.11ad- up to 7Gbps at 60 GHz
***The 60 GHz band is also more secure due to a smaller radius of signal propagation
Wired Equivalent Privacy (WEP)
Legacy wireless security that can be cracked in 5 minutes. TKIP was introduced to make it much more secure, but that has long since been broken.
Wireless Application Protocol (WAP)
used for ancient wireless devices. Uses WML for webpage display.
Sometimes the connection between the WAP server and the internet wasn't encrypted, which created security risks.
Wi-Fi Protected Access (WPA)
Created to implement the 802.11i standard. WPA2 takes care of all of it, while WPA only lives up to some of it.
WPA uses TKIP, and WPA2 uses CCMP
Wireless Transport Layer Security (WTLS)
Security for WAP.
Similar to TLS, but considerably less powerful.
Security levels in WAP
-Anyone can connect to the web portal
-You must authenticate against a server
Two-way (client server) authentication
-The server must authenticate with the client must authenticate with the server.
Technologies used to communicate between WAP device and server
Wireless Session Protocol (WSP)
-Session information and connection
Wireless Transaction Protocol (WTP)
-Similar in function to TCP and UDP
Wireless Datagram Protocol (WDP)
-Common interface between devices
When you have to agree to terms and conditions in order to access the internet. An example of this would be at Starbucks.
Extensible Authentication Protocol
Framework of authentication for wireless networks.
The important ones are LEAP and PEAP.
It's used for WPS, which is terrible.
LEAP is Cisco proprietary and is being phased out. It requires mutual authentication, but it's susceptible to dictionary attacks.
PEAP was developed by Cisco, RSA, and Microsoft. It has native support in Windows (starting with XP), and has replaced all former versions of EAP.
You listen to a wireless network and you can see information about the network, including what systems are in use and which protocols they're using.
Driving around in search of wireless access points that are either unrestricted or easily hacked.
Writing on a wall, on the street, on a sign, etc. information about a wireless access point you've jumped on to
Spam over Bluetooth. It's annoying, but mostly harmless.