Certified Ethical Hacker (CEHv13) Module 16 Hacking Wireless Networks

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/159

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

160 Terms

1
New cards

Wireless Network

An unbounded data communication system that uses radio-frequency technology to communicate with devices and obtain data

2
New cards

Global System for Mobile Communications (GSM)

A universal system used for mobile data transmission in wireless networks worldwide

3
New cards

Bandwidth

The amount of information that may be broadcast over a connection

4
New cards

Access point (AP)

Used to connect wireless devices to a wireless/wired network. It serves as a switch or hub between a wired LAN and wireless network.

5
New cards

Basic service set identifier (BSSID)

The media access control (MAC) address of an access point (AP) or base station that has set up a basic service set (BSS)

6
New cards

Industrial, scientific, and medical (ISM) band

A set of frequencies used by the international industrial, scientific, and medical communities

7
New cards

Hotspot

Places where wireless networks are available for public use

8
New cards

Association

The process of connecting a wireless device to an AP

9
New cards

Service set identifier (SSID)

A 32-alphanumeric-character unique identifier given to a wireless local area network (WLAN) that acts as a wireless identifier of the network

10
New cards

Orthogonal frequency-division multiplexing (OFDM):

A method of digital modulation of data in which a signal, at a chosen frequency, is split into multiple carrier frequencies that are orthogonal to each other. OFDM maps information on the changes in the carrier phase, frequency, amplitude, or a combination of these and shares bandwidth with other independent channels. It produces a transmission scheme that supports higher bit rates than parallel channel operation. It is also a method of encoding digital data on multiple carrier frequencies.

11
New cards

Multiple input, multiple output-orthogonal frequency-division multiplexing (MIMO-OFDM)

MIMO-OFDM influences the spectral efficiency of 4G and 5G wireless communication services. Adopting the MIMO-OFDM technique reduces interference and increases the channel robustness.

12
New cards

Direct-sequence spread spectrum (DSSS)

A spread spectrum technique that multiplies the original data signal with a pseudo-random noise-spreading code. Also referred to as a data transmission scheme or modulation scheme, the technique protects signals against interference or jamming.

13
New cards

Frequency-hopping spread spectrum (FHSS)

A method of transmitting radio signals by rapidly switching a carrier among many frequency channels

14
New cards

Wi-Fi

A WLAN based on the IEEE 802.11 standard, and it allows a device to access the network from anywhere within the range of an AP

15
New cards

Advantages of Wireless Networks

- Installation is fast and easy

- Easily provides connectivity in areas where it is difficult to lay cables

- The network can be accessed from anywhere within the range of an AP

- Public spaces such as airports, libraries, schools, and even coffee shops offer constant Internet connections through WLANs

16
New cards

Disadvantages of Wireless Networks

- Security may not meet expectations

- The bandwidth suffers as the number of devices in the network increases

- Wi-Fi upgrades may require new wireless cards and/or APs

- Some electronic equipment can interfere with Wi-Fi networks

17
New cards

Types of Wireless Networks

- Extension to a Wired Network

- Multiple Access Points

- LAN-to-LAN Wireless Network

- 3G/4G/5G Hotspot

18
New cards

Extension to a Wired Network

A user can extend a wired network by placing APs between a wired network and wireless devices

19
New cards

Types of Access Points (APs)

- Software Access Points (SAPs)

- Hardware Access Points (HAPs)

20
New cards

Software Access Points (SAPs)

Can be connected to a wired network, and they run on a computer equipped with a wireless network interface card (NIC)

21
New cards

Multiple Access Points

The network connects computers wirelessly using multiple APs. If a single AP cannot cover an area, multiple APs or extension points can be established.

22
New cards

Roaming

The ability to move around seamlessly in a network

23
New cards

LAN-to-LAN Wireless Network

APs provide wireless connectivity to local computers, and local computers on different networks can be interconnected. All hardware APs have the capability to interconnect with other hardware APs. However, interconnecting LANs over wireless connections is a complex task.

24
New cards

3G/4G/5G Hotspot

A type of wireless network that provides Wi-Fi access to Wi-Fi-enabled devices

25
New cards

Wi-Fi Authentication Process Modes

- Pre-Shared Key (PSK) Mode

- Centralized Authentication Mode

26
New cards

WPA/WPA2/Pre-Shared Key (PSK) Mode

Used to secure wireless networks in which a single shared password is used for authentication

27
New cards

Centralized Authentication Mode

A centralized authentication server, known as the remote authentication dial-in user service (RADIUS), sends authentication keys to both the AP and the client, which requires authentication with the AP.

28
New cards

WPA/WPA2-Enterprise/802.1x Mode

A security protocol designed for enterprises and large-scale network environments. It utilizes a centralized authentication server, typically a RADIUS server, to manage individual user credentials.

29
New cards

Types of Wireless Antennas

- Directional Antenna

- Omnidirectional Antenna

- Parabolic Grid Antenna

- Yagi Antenna

- Dipole Antenna

- Reflector Antenna

30
New cards

Directional Antenna

Can broadcast and receive radio waves from a single direction

31
New cards

Omnidirectional Antenna

Radiate electromagnetic (EM) energy in all directions, providing a 360° horizontal radiation pattern.

32
New cards

Parabolic Grid Antenna

Uses the same principle as a satellite dish, but it does not have a solid dish. It consists of a semi-dish in the form of a grid consisting of aluminum wires. Parabolic grid antennas can achieve very-long-distance Wi-Fi transmissions through highly focused radio beams.

33
New cards

Yagi Antenna

A unidirectional antenna commonly used in communications at a frequency band of 10 MHz to VHF and UHF. This antenna has a high gain and low signal-to-noise (SNR) ratio for radio signals. Furthermore, it not only has a unidirectional radiation and response pattern, but also concentrates the radiation and response. It consists of a reflector, dipole, and many directors. This antenna develops an end-fire radiation pattern.

34
New cards

Dipole Antenna

A straight electrical conductor measuring half a wavelength from end to end, and it is connected at the center of the radio frequency (RF) feed line. Also called a doublet, the antenna is bilaterally symmetrical; therefore, it is inherently a balanced antenna. This kind of antenna feeds on a balanced parallel-wire RF transmission line.

35
New cards

Reflector Antennas

Are used to concentrate EM energy that is radiated or received at a focal point. These reflectors are generally parabolic. If the surface of the parabolic antenna is within a tolerance limit, it can be used as a primary mirror for all frequencies. This can prevent interference while communicating with other satellites. A larger antenna reflector in terms of wavelength multiples results in a higher gain. Reflector antennas reflect radio signals and has a high manufacturing cost.

36
New cards

Wireless Encryption

A process of protecting a wireless network from attackers who attempt to collect sensitive information by breaching the RF traffic

37
New cards

802.11

The 802.11 (Wi-Fi) standard applies to WLANs and uses FHSS or DSSS as the frequency-hopping spectrum. It allows an electronic device to establish a wireless connection in any network.

38
New cards

802.11a

The first amendment to the original 802.11 standard. The 802.11 standard operates in the 5 GHz frequency band and supports bandwidths up to 54 Mbps using orthogonal frequency-division multiplexing (OFDM). It has a high maximum speed but is relatively more sensitive to walls and other obstacles.

39
New cards

802.11ax (Wi-Fi 6)

The latest generation of Wi-Fi and enhances the foundation of 802.11ac (Wi-Fi 5). It supports speeds of up to 9.6 Gbps, uses orthogonal frequency-division multiple access (OFDMA) to efficiently manage multiple connections, and improves performance in crowded areas through features such as BSS Coloring and target wake time (TWT). Wi-Fi 6 is ideal for dense environments, such as stadiums, airports, and smart homes with many connected devices.

40
New cards

802.11b

Extended the 802.11 standard by creating the 802.11b specifications in 1999. This standard operates in the 2.4 GHz ISM band and supports bandwidths up to 11 Mbps using direct-sequence spread spectrum (DSSS) modulation.

41
New cards

802.11be (Wi-Fi 7)

An emerging standard that aims to significantly improve Wi-Fi 6/6E. It supports speeds of up to 30 Gbps, uses a multilink operation (MLO) to aggregate multiple channels across different bands, and reduces the latency for real-time applications. Wi-Fi 7 was designed for future-proof, ultrahigh-speed Internet, virtual reality, augmented reality, and advanced IoT applications.

42
New cards

802.11d

An enhanced version of 802.11a and 802.11b that supports regulatory domains. The specifications of this standard can be set in the media access control (MAC) layer.

43
New cards

IEEE 802.11e

Used for real-time applications such as voice, VoIP, and video. To ensure that these time-sensitive applications have the network resources they need, 802.11e defines mechanisms to ensure quality of service (QoS) to Layer 2 of the reference model, which is the MAC layer.

44
New cards

802.11g

Extension ·of 802.11 and supports a maximum bandwidth of 54 Mbps using OFDM technology. It uses the same 2.4 GHz band as 802.11b. The IEEE 802.11g standard defines high-speed extensions to 802.11b and is compatible with the 802.11b standard, which means 802.11b devices can work directly with an 802.11g AP.

45
New cards

802.11i

Improves ·WLAN security by implementing new encryption protocols such as the Temporal Key Integrity Protocol (TKIP) and Advanced Encryption Standard (AES).

46
New cards

802.11n

A revision that enhances the 802.11g standard with multiple-input multiple-output (MIMO) antennas. It works in both the 2.4 GHz and 5 GHz bands. Furthermore, it is an IEEE industry standard for Wi-Fi wireless local network transportation. Digital Audio Broadcasting (DAB) and WLAN use OFDM.

47
New cards

802.11ah/Wi-Fi HaLow

Uses 900 MHz bands for extended-range Wi-Fi networks and supports Internet of Things (IoT) communication with higher data rates and wider coverage range than the previous standards.

48
New cards

802.11ac

Provides a·high-throughput network at a frequency of 5 GHz. It is faster and more reliable than the 802.11n standard. Moreover, it involves Gigabit networking, which provides an instantaneous data-transfer experience.

49
New cards

802.11ad

The 802.11ad standard includes a new physical layer for 802.11 networks and works on the 60 GHz spectrum. The data propagation speed in this standard is much higher from those of standards operating on the 2.4 GHz and 5 GHz bands, such as 802.11n.

50
New cards

802.12

Media utilization is dominated by this standard because it works on the demand priority protocol. The Ethernet speed with this standard is 100 Mbps. Furthermore, it is compatible with the 802.3 and 802.5 standards. Users currently on those standards can directly upgrade to the 802.12 standard.

51
New cards

802.15

Defines the standards for a wireless personal area network (WPAN) and describes the specifications for wireless connectivity with fixed or portable devices

52
New cards

802.15.1 (Bluetooth)

Mainly used for exchanging data over short distances on fixed or mobile devices. This standard works on the 2.4 GHz band.

53
New cards

802.15.4 (ZigBee)

Has a low data rate and complexity. The specification used in this standard is ZigBee, transmits long-distance data through a mesh network. The specification handles applications with a low data rate of 250 Kbps, but its use increases battery life.

54
New cards

802.15.5

This standard deploys itself on a full-mesh or half-mesh topology. It includes network initialization, addressing, and unicasting.

55
New cards

802.16 (WiMAX)

A wireless communications standard designed to provide multiple physical layer (PHY) and MAC options. It is also known as WiMax. This standard is a specification for fixed broadband wireless metropolitan access networks (MANs) that use a point-to-multipoint architecture.

56
New cards

Wireless Standards

- 802.11 (Wi-Fi): 802.11a, 802.11x, 802.11ax, 802.11b, 802.11be, 802.11d, 802.11e, 802.11g, 802.11i, 802.11n

- 802.15 (Bluetooth)

- 802.15.4 (ZigBee)

- 802.16 (WiMAX)

57
New cards

Wireless Encryption Algorithms

- 802.11i

- WEP

- EAP

- LEAP

- WPA

- TKIP

- WPA2

- AES

- CCMP

- WPA2 Enterprise

- RADIUS

- PEAP

- WPA3

58
New cards

WEP

Aan encryption algorithm for IEEE 802.11 wireless networks. It is an old wireless security standard and can be cracked easily.

59
New cards

Extensible Authentication Protocol (EAP)

EAP supports multiple authentication methods, such as token cards, Kerberos, and certificates

60
New cards

Lightweight EAP (LEAP)

A proprietary version of EAP developed by Cisco

61
New cards

WPA

An advanced wireless encryption protocol using TKIP and Message Integrity Check (MIC) to provide strong encryption and authentication. It uses a 48-bit initialization vector (IV), 32-bit cyclic redundancy check (CRC), and TKIP encryption for wireless security.

62
New cards

TKIP

A security protocol used in WPA as a replacement for WEP

63
New cards

WPA2

An upgrade to WPA using AES and the Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP) for wireless data encryption.

64
New cards

AES

A symmetric-key encryption used in WPA2 as a replacement for TKIP

65
New cards

CCMP

An encryption protocol used in WPA2 for strong encryption and authentication

66
New cards

WPA2 Enterprise

Integrates EAP standards with WPA2 encryption

67
New cards

RADIUS

A centralized authentication and authorization management system

68
New cards

PEAP

A protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel

69
New cards

WPA3

Third-generation Wi-Fi security protocol that provides new features for personal and enterprise usage. It uses Galois/Counter Mode-256 (GCMP-256) for encryption and the 384-bit hash message authentication code with the Secure Hash Algorithm (HMAC-SHA-384) for authentication.

70
New cards

WPA2 Modes

- Personal

- Enterprise

71
New cards

WPA3 Modes

- Personal

- Enterprise

72
New cards

Wireless Threats

- Access Control Attacks

- Integrity Attacks

- Confidentiality Attacks

- Availability Attacks

- Authentication Attacks

73
New cards

Access Control Attacks

- MAC spoofing

- AP misconfiguration (SSID broadcast, Weak Password, Configuration Error)

- Ad hoc associations

- Promiscuous client

- Client Missassociation

- Unauthorized association

74
New cards

MAC Spoofing

Using the MAC spoofing technique, an attacker can reconfigure a MAC address to appear as an authorized AP to a host on a trusted network.

75
New cards

AP Misconfiguration

If a user improperly configures any of the critical security settings at any of the APs, the entire network could be exposed to vulnerabilities and attacks.

76
New cards

Common AP Misconfiguration Key Elements

- Weak Password

- SSID Broadcast

- Configuration error

77
New cards

SSID Broadcast

Attacker configures APs to broadcast SSIDs to authorized users. All AP models have their own default SSID, and APs with default configurations using default SSIDs are vulnerable to brute-force dictionary attacks. Even if users enable WEP, an unencrypted SSID broadcasts the password in plaintext

78
New cards

Ad hoc associations

Wi-Fi clients can communicate directly via an ad-hoc mode that does not require an AP to relay packets. Security threats arise when an attacker forces a network to enable the ad-hoc mode.

79
New cards

Promiscuous client

Attacker places an AP near the target Wi-Fi network and gives it a common SSID, offering an irresistibly stronger signal and higher speed than the target Wi-Fi network. The intent is to lure the client to connect to the attacker's AP, rather than a legitimate Wi-Fi network.

80
New cards

Client mis-association:

Mis-association is a security flaw that can occur when a network client connects with a neighboring AP. To perform a client mis-association attack, an attacker sets up a rogue AP outside the corporation's perimeter and lures clients to connect. Once a client connects to the rogue AP, an attacker can retrieve sensitive information.

81
New cards

Unauthorized association forms

- Accidental association

- Malicious association

82
New cards

Accidental association

Involves connecting to the target network's AP from a neighboring organization's overlapping network without the victim's knowledge

83
New cards

Malicious association

The attacker creates a soft AP, typically on a laptop, by running a tool that makes the laptop's NIC appear as a legitimate AP. The attacker infects the victim's machine and activates soft APs, allowing an unauthorized connection to the enterprise network.

84
New cards

Integrity Attack

Involves changing or altering data during transmission

85
New cards

Integrity Attacks

- Data-Frame Injection

- WEP Injection

- Bit-Flipping Attacks

- Extensible AP Replay

- Data Replay

- IV Replay

- RADIUS Replay

- Wireless Network Viruses

86
New cards

RADIUS Replay

Capturing RADIUS Access-Accept or Reject messages for later replay

87
New cards

Data-Frame Injection

Constructing and sending forged 802.11 frames

88
New cards

WEP Injection

Constructing and sending forged WEP encryption keys

89
New cards

Bit-Flipping Attacks

Capturing the frame and flipping random bits in the data payload, modifying the ICV, and sending it to the user

90
New cards

Extensible AP Replay

Capturing 802.1X Extensible Authentication Protocols for later replay

91
New cards

Data Replay

Capturing 802.11 data frames for later (modified) replay

92
New cards

Initialization Vector Replay Attacks

Deriving the keystream by sending a plaintext message

93
New cards

Wireless Network Viruses

Viruses have a great impact on wireless networks. They can provide an attacker with a simple method to compromise APs

94
New cards

Confidentiality Attack

Attempts to intercept confidential information

95
New cards

Confidentiality Attacks

- Eavesdropping

- Traffic Analysis

- Cracking WEP Key

- Evil Twin AP

- Honeypot AP

- Session Hijacking

- Masquerading

- MITM Attack

96
New cards

Eavesdropping

Capturing and decoding unprotected application traffic to obtain potentially sensitive information

97
New cards

Traffic Analysis

Inferring information from the observation of external traffic characteristics

98
New cards

Cracking WEP Key

Capturing data to recover a WEP key using brute force or Fluhrer-Mantin-Shamir (FMS) cryptanalysis

99
New cards

Evil Twin AP

Posing as an authorized AP by beaconing the WLAN's SSID to lure users

100
New cards

Honeypot AP

Setting an AP's SSID to be the same as that of a legitimate AP