Sec+ Chapter 13: Wireless and Mobile Security Flashcards
(42 cards)
Connectivity modes
1) Cellular
2) Wi-Fi
3) Bluetooth
4) NFC
5) RFID
6) Infrared
7) GPS
8) USB
Wi-Fi ad hoc mode
Allows devices to talk directly to each other
Wi-Fi infrastructure mode
Sends traffic through a base station or access point
SSID
Service set identifier
Identifies the name of a Wi-Fi network
SSIDs are either broadcast or private
Point to point network
Connects two nodes and transmissions between them can only be received by the endpoints
Point to multipoint network
Wi-Fi, has many nodes receiving information sent by a node
Most common network we use today, like the one in our home
Broadcast network
Sends out information on many nodes and doesn’t care about receiving a response
EX: GPS and radio
Evil twin
A malicious, fake access point that’s set up to appear to be a legit, trusted network
Once someone connects, attacker will capture all of the victim’s network traffic, present false versions of sites, etc
Rogue access point
Access points added to your network either on purpose or unintentionally without your authorization
They offer a point of entry to attackers or other unwanted users
Defense: Monitor your network for added WAPs, range your physical perimeter to look, and use 802.1x to require anyone to authenticate, regardless of connection point
Bluejacking
When an attacker sends unsolicited messages to Bluetooth enabled devices
Bluesnarfing
Unauthorized access to a Bluetooth device, typically aimed at gathering info from a device like contacts, emails, calendars, etc
BIAS
Bluetooth impersonation attacks
Exploits a lack of mutual authentication, authentication procedure downgrade options, and the ability to switch roles
Disassociation
When a device disconnects from an access point
Attackers will try to force disassociation to set up more powerful evil twin or capture info as the system tries to reconnect
Jamming
Blocks all traffic in the range or frequency it’s conducted against
Attackers can send constant random bits or legit frames to disrupt the normal flow of communication
Site survey
Physically walking through a facility or space to determine what existing networks are in place and where the physical structure is for access points
2.4 GHz channels
+
11 channels - 20 MHz wide - 5 MHz space between
1, 6, 11 commonly used to avoid overlap
How to secure access points?
1) Change default settings
2) Disable insecure protocols and services
3) Set stronger passwords
4) Protect admin interfaces with isolated VLAN
5) Regularly patch and update
6) Turn on monitoring and logging
WPA Personal
WPA2 mode that uses preshared key that lets clients authenticate without an authentication server infrastructure
AKA: WPA-PSK (preshared key)
WPA Enterprise
WPA2 mode that relies on RADIUS authentication server as part of an 802.1x implementation for authentication
Users have unique credentials and can be individually identified
CCMP
Counter mode with cipher block chaining message authentication code protocol
Uses AES in WPA2 to deliver much stronger encryption than WEP and CBC-MAC for message integrity check (MIC)
WPA3
Replacement for WPA2, required to be supported in all Wi-Fi devices since 2018
Changes encryption to GCMP (Galois counter moder protocol)
AES, but MIC uses GMAC (Galois message authentication code)
SAE
Simultaneous authentication of equals
Used by WPA3 to replace shared keys in WPA2
A Diffie-Hellman derived key exchange with an authentication component
Everyone on the network uses a different session key, even with the same PSK
WPA3 personal
Implements perfect forward secrecy, which ensures traffic sent between client and network is secure, even if password has been compromised
Perfect forward secrecy
Changes encryption keys on an ongoing basis so a single exposed key won’t expose the entire communication