Wireless Security: Wireless Security By James Doren and Kelley Frey
Service Set ID (SSID): Service Set ID (SSID) Does Not Provide Much Security For Your Network!!!
SSID (Continued): SSID (Continued) Makes your network a little more private— However, any experienced hacker can work around this with ease!!
MAC Address : MAC Address Media Access Control Address- unique identifier assigned to network interfaces for communications on the physical network segment
IEEE 802 MAC-48: Addressing Scheme: IEEE 802 MAC-48: Addressing Scheme
IEEE MAC-48: Addressing Scheme (Continued): IEEE MAC-48: Addressing Scheme (Continued) 48-Bit Address Space contains 2^48 th power possible MAC Addresses That’s 281,474,976,710,656!!!!! (Expected to be available for the next 100 years) Hexadecimal Multiplication Chart
Address Resolution Protocol (ARP): Address Resolution Protocol (ARP)
ARP (Continued): ARP (Continued) ARP packet
ARP: Example: ARP: Example
802.11x: Authentication/Authorization: 802.11x: Authentication/Authorization 4 Steps in the Authentication Process: Initialization Initiation Negotiation Authentication
802.11x: Authentication/Authorization: 802.11x: Authentication/Authorization
Encryption: Encryption WEP WPA
WEP (Wired Equivalent Privacy): WEP (Wired Equivalent Privacy)
WEP: WEP WPA
WPA (Wi-Fi Protected Access): WPA (Wi-Fi Protected Access) -All computers, access points and wireless adapters must have WPA software In Pre-Shared Key mode, a passphrase is used for authentication and a single master key is used for all users. Two Modes Pre-Shared Key Enterprise
Enterprise Mode: Enterprise Mode
TKIP (Temporary Key Integrity Protocol): TKIP (Temporary Key Integrity Protocol) Scrambles keys to avoid attacks Changes temporal keys every 10,000 packets RC4 streaming cipher (same one used in WEP) 48-bit Initialization Vector Uses MIC or Message Integrity Code
Thank You!: Thank You!