Chapter 10 – Wireless Security

Attempt at communication using non-physical links. Examples Radio Waves Light Pulses Often used for networking, but can be used simply to eliminate wires for device to device communication. | Security+ All-In-One Edition Chapter 10 – Wireless Security Brian E. Brzezicki Wireless Look No Wires! Wireless Attempt at communication using non-physical links. Examples Radio Waves Light Pulses Often used for networking, but can be used simply to eliminate wires for device to device communication. Wireless LAN protocols standard Wireless LAN networking Data Link layer specifications Components Access point (a type of bridge) Wireless Card SSID family 11Mbs (same as common home devices) 54Mbps 5Ghz (not as commonly used, however absorbed by walls, yielding less range possibly) 54Mbs Cards are generally backwards compatible and can serve as or Uses Multiple Input Multiple Output (MIMO) 100Mbs or 5Ghz Wireless Problems Easy to get access to airwaves, hard to restrict! Talk about the attacks next. Wireless Attacks Wireless Attacks War driving Wireless scanners Netstumber (see next slide) Warchalking (2 . | Security+ All-In-One Edition Chapter 10 – Wireless Security Brian E. Brzezicki Wireless Look No Wires! Wireless Attempt at communication using non-physical links. Examples Radio Waves Light Pulses Often used for networking, but can be used simply to eliminate wires for device to device communication. Wireless LAN protocols standard Wireless LAN networking Data Link layer specifications Components Access point (a type of bridge) Wireless Card SSID family 11Mbs (same as common home devices) 54Mbps 5Ghz (not as commonly used, however absorbed by walls, yielding less range possibly) 54Mbs Cards are generally backwards compatible and can serve as or Uses Multiple Input Multiple Output (MIMO) 100Mbs or 5Ghz Wireless Problems Easy to get access to airwaves, hard to restrict! Talk about the attacks next. Wireless Attacks Wireless Attacks War driving Wireless scanners Netstumber (see next slide) Warchalking (2 slides) (more) NetStumbler War chalking symbols Man in the Middle Airsnarfing, put up a fake access point get people to connect with you. Evesdropping and attaining non-authorized acess Evesdropping Air Snort – breaks WEP retrieves encryption keys (security+ exam reference airsnort, even thought it’s no longer developed) aircrack-ng – breaks WEP and WPA-psk Wireless Countermeasures Turn off SSID broadcasts (problems?) Enable MAC filtering (problems?) Use Encryption (we’ll talk about this next) Use Enterprise Mode for authentication Transmission encryption There are many different types of wireless encryption protocols WEP Shared passwords (why is this bad?) 64/40 or 128/104 bit key Uses RC4 Easily crack able (due to key reuse) Only option for (more) Transmission Encryption WPA PSK Shared password Uses TKIP normally RC4 with changing keys Can use AES (not certified) 128 bit key WPA2 PSK Uses AES (normally) 128 bit key Can use TKIP RC4 with changing keys (more) Transmission .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.