Week 11 Flashcards

(9 cards)

1
Q

Common WLAN threats

A

Packet Sniffing (Eaves dropping)
Denial of service (RF jamming)
Rogue Access Points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is WEP

A

Wired Equivalent Privacy
Outdated wireless encryption protocol which utilises Stream cipher
Utilises 24bits for IV (Initialisation Vector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weakness in WEP

A
  • Capture one challenge and response
  • Both plain text and cipher are available
  • Key can be obtained through XOR
  • Once obtain key stream, easily encrypt other data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain 802.11I

A

Strong message integrity check
Longer IV (48 bits)
Extensible Authentication protocol
Mutual Authentication
Robust Security Network (RSN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain TKIP

A

Temporal Key Integrity Protocol
-Key Mixing
- Algorithm Message Integrity Code
- Sequence numbers
- Use 48 bit IV size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain 802.1x process

A
  1. Wireless request access to WLAN, authenticator ask for identitiy and issue temporary encryption key
  2. Client sends username and password
  3. AP replays it to the authentication server using another encryption key
  4. Once authentication server verifies credentials, issue key for TKIP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Digital Signature

A
  • Digital signature used to prove ownership of public key
  • Issued by Certificate Authority (CA)
  • Key, Information, Owner identitiy, digital signature
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Type of EAP (WPA1)

A

Extensible Authentication Protocol
1. EAP-MD5 (very weak)
2. LEAP (Lightweight EAP), rely on user password srength
3. EAP-TLS (Transport Layer Security),client and server has cert
4. EAP-TTLS (Tunned TLP), server certificate only
5. PEAP (Protected EAP), SESSION key to get network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain WPA 2

A

Uses AES
USE CCM Protocol header
48 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly