CEH.V6.-.Module.20.Hacking.Wireless.Networks

Reproduction is strictly prohibited wpa

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: rarely: • Used to negotiate and communicate "temporal keys" • "Temporal keys" are used to encrypt packets instead • Does not solve issues with the management frames • Collision avoidance mechanism can still be exploited • Can be supported by most of the 802.11b hardware EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WPA Vulnerabilities Denial-of-service attack: • Attacker injects or corrupts packets • IV and message hash are checked before MIC to reduce the number of false positives • Only way around this is to use WEP Pre-shared key dictionary attack: • Weak passphrase is used to generate pre-shared key • Comprises of 14 characters or less that form words • More than 14 characters that do not form words are almost impossible to crack EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WEP, WPA, and WPA2 WEP is weak and fails to meet any of its goals WPA fixes most of WEP’s problems, but adds some new vulnerabilities WPA2 is expected to make wireless networks as secure as wired networks EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WPA2 Wi-Fi Protected Access 2 WPA2 is compatible with the 802.11i standard It provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm It offers two modes of operation: • Enterprise: Verifies network users through a server • Personal: Protects unauthorized network access by utilizing a set-up password EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WPA2 Wi-Fi Protected Access 2 (cont (cont’d) Features: • WPA2 authentication • WPA2 key management • Temporal Key management • Michael Algorithm • AES support • Supporting a mixture of WPA and WEP wireless clients EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Attacks and Hacking Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Terminologies WarWalking – Walking around to look for open wireless networks networks Wardriving – Driving around to look for open wireless networks WarFlying – Flying around to look for open wireless networks WarChalking – Using chalk to identify available open networks Blue jacking – Temporarily hijacking another person’s cell phone using Bluetooth technology Global Positioning System (GPS) – It can be used to help map (GPS) It the open networks that are found EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WarChalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WarChalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WarChalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited WarChalking EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Authentication and (Dis)Association (Dis)Association Attacks Any station can impersonate another station or access point and attack or interfere with the authentication and association mechanisms: • As these frames are not encrypted, the difficulty is tri...
View Full Document

This note was uploaded on 02/12/2013 for the course CEH v6 taught by Professor John during the Summer '13 term at West Point.

Ask a homework question - tutors are online