NIS Chapter 02 Flashcards
in which layer of the OSI model does 802.11 authentication? And what purpose does this authentication serve?
- In the 2nd layer
- it serves the purpose of establishing an initial connection between the AP and the client
What are the 2 methods for authentication in the 802.11 2007
Open system authentication and shared key authentication
What is Open System Authentication? What is the alias for it?
this is a type of authentication method used in 802.11 used to create a connection between a client and an AP. The AP creates this connection without any prior client validation.
- null authentication
In detail, describe the 2 message authentication transaction sequence
for which authentication method?
- message one asserts identity and requests authentication
- the 2nd returns the authentication result
what is a vulnerability of OSA?
There are many ways that SSIDs can be discovered and this method is based on the matching of SSIDs
To use OSA safely, the SSID can be cloaked in order to prevent potential attackers finding the SSID. Is this a good approach?
Apparently not, it is not always possible to turn off SSID beaconing
Name 2 other OSA vulnerabilities
- does not allow for freely roaming because authentication is needed when moving between APs
- It is not that difficult to find the SSID even with beaconing turned off because AP sends other management frames.
What is another way that a non broadcasted SSID can be detected?
BY sending a disassociation frame, forcing a association again and then listening in on the SSID
what security protocol is used by shared key authentication? And how do they work together?
WEP
It is used to authenticate clients stations. A static WEP key needs to be known on the client and the AP
provide in detail the steps taken in authenticating a client device in Shared key authentication (5)
- the client will send an authentication frame requesting to be authenticated
- The AP will send a challenge text
- The client will have to encrypt the text sent using the supposed shared key and send it back to AP
- AP will encrypt and compare and then either authenticate or not \
- send auth frame if matches
What is the security risk associated with the SKA?
the clear text that is used to authenticate can be captured and then used to derive the static WEP key. And since the key is static, all the frames can be decrypted
What is the WEP encryption?
a WIFI security standard intended to bring confidentiality through encryption
Why is the WEP considered flawed?
- the encryption algo in itself is weak (how?)
and there is not key management, a single key is used for all frames which is extremely risky
Name 3 reasons why the WEP is considered a weak algorithm
- Key sizes are considered small and are therefore susceptible to brute-force attacks
- RC4 stream cipher used by WEP is considered weak in itself
- Reuse of initialisation vectors make recognisable patterns
What is the protocol that was introduced to replace WEP?
TKIP