Hacking Wireless Networks - Wireless Encryption

0.0(0)
studied byStudied by 0 people
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/49

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

50 Terms

1
New cards

What is a process of protecting a wireless network from attackers who attempt to collect sensitive information by breaching the RF traffic?

Wireless encryption

2
New cards

What is an IEEE amendment that specifies security mechanisms for 802.11 wireless networks?

802.11i

3
New cards

What is an encryption algorithm for IEEE 802.11 wireless networks? It is an old wireless security standard and can be cracked easily.

WEP (Wired Equivalent Privacy)

4
New cards

What supports multiple authentication methods, such as token cards, Kerberos, and certificates?

EAP (Extensible Authentication Protocol)

5
New cards

What is a proprietary version of EAP developed by Cisco?

LEAP (Lightweight Extensible Authentication Protocol)

6
New cards

What is an advanced wireless encryption protocol using TKIP and Message Integrity Check (MIC) to provide strong encryption and authentication? It uses a 48-bit initialization vector (IV), 32-bit cyclic redundancy check (CRC), and TKIP encryption for wireless security.

WPA (Wi-Fi Protected Access)

7
New cards

What is a security protocol used in WPA as a replacement for WEP?

TKIP (Temporal Key Integrity Protocol)

8
New cards

What is an upgrade to WPA using AES and the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) for wireless data encryption?

WPA2

9
New cards

What is a symmetric-key encryption used in WPA2 as a replacement for TKIP?

AES (Advanced Encryption Standard)

10
New cards

What is an encryption protocol used in WPA2 for strong encryption and authentication?

CCMP (Counter Mode Cipher Block Chaining Message Authentication Code Protocol)

11
New cards

What integrates EAP (Extensible Authentication Protocol) standards with WPA2 encryption?

WPA2 Enterprise

12
New cards

What is a centralized authentication and authorization management system?

RADIUS (Remote Authentication Dial-In User Service)

13
New cards

What is a protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel?

PEAP (Protected Extensible Authentication Protocol)

14
New cards

What uses Galois/Counter Mode-256 (GCMP-256) for encryption and the 384-bit hash message authentication code with the Secure Hash Algorithm (HMAC-SHA-384) for authentication for personal and enterprise usage?

WPA3

15
New cards

What is a security protocol defined by the 802.11b standard; it was designed to provide a wireless LAN with a level of security and privacy comparable to that of a wired LAN?

WEP (Wired Equivalent Privacy)

16
New cards

What uses a 24-bit initialization vector (IV) to form stream cipher RC4 (Rivest Cipher) for confidentiality and the CRC-32 checksum for integrity of wireless transmissions?

WEP (Wired Equivalent Privacy)

17
New cards

What has significant vulnerabilities and design flaws and can therefore be easily cracked?

WEP (Wired Equivalent Privacy)

18
New cards

What are the main advantages of WEP?

Confidentiality: It prevents link-layer eavesdropping, Access Control: It determines who may access data, Data Integrity: It protects the change of data by a third party and Efficiency

19
New cards

What are the flaws of WEP?

No defined method for encryption key distribution, RC4 was designed to be used in a more randomized environment than that utilized by WEP (the same key is used repeatedly and has plaintext), Attackers analyze the traffic from passive data captures and crack WEP keys with the help of tools such as Fern Wifi Cracker and WEP-key-break and Key scheduling algorithms are also vulnerable to attack.

20
New cards

What is a security protocol defined by 802.11i standards; it uses a Temporal Key Integrity Protocol (TKIP) that utilizes the RC4 stream cipher encryption with 128-bit keys and 64-bit MIC integrity check to provide stronger encryption and authentication?

WPA (Wi-Fi Protected Access)

21
New cards

What uses TKIP (Temporal Key Integrity Protocol) to eliminate the weaknesses of WEP by including per-packet mixing functions, message integrity checks, extended initialization vectors, and re-keying mechanisms?

WPA (Wi-Fi Protected Access)

22
New cards

What includes mandatory support for counter mode with cipher block chaining message authentication code protocol (CCMP), an AES-based encryption mode with strong security?

WPA2

23
New cards

What It uses a set-up password (pre-shared Key, PSK) to protect unauthorized network accesses and In PSK mode, each wireless network device encrypts the network traffic using a 128-bit key, which is derived from a passphrase of 8 to 63 ASCII characters?

WPA2-Personal

24
New cards

What includes EAP or RADIUS for centralized client authentication using multiple authentication methods, such as token cards, and Kerberos?

WPA2-Enterprise

25
New cards

What provides trailblazing protocols and uses the AES-GCMP 256 encryption algorithm?

WPA3

26
New cards

What is mainly used to deliver password-based authentication using the SAE (Simultaneous Authentication of Equals) protocol, also known as Dragonfly Key Exchange?

WPA3-Personal

27
New cards

What protects sensitive data using many cryptographic algorithms, provides authenticated encryption using GCMP-256 (Galois/Counter Mode Protection), uses HMAC-SHA-384 (Hash-based Message Authentication Code) to generate cryptographic keys, and uses ECDSA-384 (Elliptic Curve Digital Signature Algorithm) for exchanging keys?

WPA3-Enterprise

28
New cards

What are the modes of operation for WPA3-Personal?

Resistance to offline dictionary attacks (brute-forcing), Resistance to key recovery, Natural password choice, and Easy accessibility

29
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

CRC-32 does not ensure complete cryptographic integrity

30
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

IVs are 24 bits and sent in cleartext

31
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

Vulnerable to known plaintext attacks

32
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

Prone to password cracking attacks

33
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

Associate/disassociate messages are not authenticated

34
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

One can easily construct a decryption table of reconstructed key streams

35
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

Lack of centralized key management

36
New cards

Name one of the eight issues with WEP (Wired Equivalent Privacy)

IV is a part of the RC4 encryption key, which leads to an analytical attack

37
New cards

Name one of the five issues with WPA (Wi-Fi Protected Access)

Pre-shared key is vulnerable to eavesdropping and dictionary attacks

38
New cards

Name one of the five issues with WPA (Wi-Fi Protected Access)

Lack of forward secrecy

39
New cards

Name one of the five issues with WPA (Wi-Fi Protected Access)

WPA-TKIP is vulnerable to packet spoofing and decryption attacks

40
New cards

Name one of the five issues with WPA (Wi-Fi Protected Access)

Insecure random number generator (RNG) in WPA allows the discover of GTK generated by AP

41
New cards

Name one of the five issues with WPA (Wi-Fi Protected Access)

Vulnerabilities in TKIP allow attackers to guess the IP address of the subnet

42
New cards

Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)

Pre-shared key is vulnerable to eavesdropping and dictionary attacks

43
New cards

Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)

Lack of forward secrecy

44
New cards

Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)

Hole96 vulnerability makes WPA2 vulnerable to MITM and DoS attacks

45
New cards

Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)

Insecure random number generator (RNG) in WPA2 allow attackers to discover GTK generated by AP

46
New cards

Name one of the five issues with WPA2 (Wi-Fi Protected Access 2)

KRACK vulnerabilities make WPA2 vulnerable to packet sniffing, connection hijacking, malware injection, and decryption attacks

47
New cards

Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)

WPA3 uses more complex encryption algorithms, which can demand more processing power from devices

48
New cards

Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)

Simultaneous Authentication of Equals (SAE) vulnerable to timing attacks

49
New cards

Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)

Vulnerable to cache-based side-channel attacks, exposing sensitive information from cache access patterns

50
New cards

Name one of the four issues with WPA3 (Wi-Fi Protected Access 3)

Errors in configuration such as weak passwords and poor network setup, can leave networks vulnerable to intrusion, despite the advanced protections offered by WPA3