0% found this document useful (0 votes)
9 views11 pages

1.1 3. Wireless Security Protocols

The document outlines the Ultimate Wireless Penetration Testing Course, covering various wireless security protocols including WEP, WPA, WPA2, and WPA3. It details the vulnerabilities and weaknesses of each protocol, as well as methods for attacking them, such as deauthentication and PMKID attacks. Additionally, it discusses tools and techniques for automating attacks and emphasizes the importance of understanding wireless security in penetration testing.

Uploaded by

Shadowplay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views11 pages

1.1 3. Wireless Security Protocols

The document outlines the Ultimate Wireless Penetration Testing Course, covering various wireless security protocols including WEP, WPA, WPA2, and WPA3. It details the vulnerabilities and weaknesses of each protocol, as well as methods for attacking them, such as deauthentication and PMKID attacks. Additionally, it discusses tools and techniques for automating attacks and emphasizes the importance of understanding wireless security in penetration testing.

Uploaded by

Shadowplay
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

THE ULTIMATE WIRELESS

PENETRATION TESTING COURSE


Wireless Security Protocols
! Introduction

! Wireless Basics and Terminologies

! Wireless Security Protocols

! Aircrack-NG Suite and setting up

! Attacking WEP

! Attacking WPA/WPA2 (deauth, hash capture and cracking)

! PMKID Attacks

! DoS Attacks

! WPS Attacks

! Evil Twin and Social Engineering

! Automate Attacks

! Advanced Tools
Wireless Security Protocols
(Open)
• No Security (Open Authentication)
• Any client can connect
Wireless Security Protocols
(Hiding SSID)
• This is NOT a security features
• SSID not sent in broadcast beacons
• Prevents normal users from not seeing SSID
• Packet sniffer in monitor mode can scan for
probe requests
• Netstumbler, Kismet etc. can all uncover
hidden ideas with basic scans
Wireless Security Protocols
(WEP – Wired Equivalent Privacy)
• NOT Secure! – Introduced in 1999
• 40 or 104 bit key length (easily cracked)
• Based on RC4 with known weaknesses
• Shared keys (1 key for all) – no session keys
• Weak IV (24 bit) – reused frequently
• Need to collect enough IVs
• No data integrity protection
• Crack-able within a few minutes
• Still in use in development countries
Wireless Security Protocols
(WPA – Wi-Fi Protected Access)
• Introduced in 2003
• Enhancements to crypto (256 bit key) & auth
• TKIP (Temporal Key Integrity Protocol)
• TKIP generates unique encryption keys for
each data packet
• MIC (Message Integrity Check) – Anti tamper
• Supports EAP / Radius
• Also supports PSK
• Security depends on passphrase in PSK
• Inherits some weaknesses of WEP
• Subject to dictionary / rainbow table attacks
Wireless Security Protocols
(WPA – Wi-Fi Protected Access)
• Firmware update from WEP was easy – no
new hardware was required
• Encr. key mixing (keys derived from PSK)
• Message Integrity Check (MIC)
• Per-packet key derivation
• Replay attack protection
• Still relatively weak crypto
• Not recommended to be used
Wireless Security Protocols
(WPA2 – Wi-Fi Protected Access 2)
• Introduced in 2004
• aka 802.11i
• WPA2-PSK and WPA2-EAP (Enterprise)
• CCMP (Counter Mode Cipher Block
Chaining) – based on AES
• CCMP requires new hardware / chipset
• Difficult to spot crypto patterns
• Incorporates 802.1x auth framework
• Backward compatible (mixed mode)
Wireless Security Protocols
(WPA2 – Wi-Fi Protected Access 2)
• Pairwise Master Key (PMK) creates Pairwise
Transient Key (PTK)
• Password and SSID are combined to create
master key
• Defeats rainbow table attacks
• Still vulnerable to various attacks (capture
hash, PMKID)
• KRACK (Key Reinstallation Attack) is a threat
(malicious network and force victim to
connect)
Wireless Security Protocols
(WPA3 – Wi-Fi Protected Access 3)
• Introduced in 2018
• Not widely adopted yet
• New protocols to avoid using passwords
• More secure handshake
• Stronger brute force protection
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy