Wireless Security


Presentation Description

No description available.


Presentation Transcript

Wireless Security:

Wireless Security By James Doren and Kelley Frey

Service Set ID (SSID):

Service Set ID (SSID) Does Not Provide Much Security For Your Network!!!

SSID (Continued):

SSID (Continued) Makes your network a little more private— However, any experienced hacker can work around this with ease!!

MAC Address :

MAC Address Media Access Control Address- unique identifier assigned to network interfaces for communications on the physical network segment

IEEE 802 MAC-48: Addressing Scheme:

IEEE 802 MAC-48: Addressing Scheme

IEEE MAC-48: Addressing Scheme (Continued):

IEEE MAC-48: Addressing Scheme (Continued) 48-Bit Address Space contains 2^48 th power possible MAC Addresses That’s 281,474,976,710,656!!!!! (Expected to be available for the next 100 years) Hexadecimal Multiplication Chart

Address Resolution Protocol (ARP):

Address Resolution Protocol (ARP)

ARP (Continued):

ARP (Continued)  ARP packet

ARP: Example:

ARP: Example

802.11x: Authentication/Authorization:

802.11x: Authentication/Authorization 4 Steps in the Authentication Process: Initialization Initiation Negotiation Authentication

802.11x: Authentication/Authorization:

802.11x: Authentication/Authorization


Encryption WEP WPA

WEP (Wired Equivalent Privacy):

WEP (Wired Equivalent Privacy)



WPA (Wi-Fi Protected Access):

WPA (Wi-Fi Protected Access) -All computers, access points and wireless adapters must have WPA software In Pre-Shared Key mode, a passphrase is used for authentication and a single master key is used for all users. Two Modes Pre-Shared Key Enterprise

Enterprise Mode:

Enterprise Mode

TKIP (Temporary Key Integrity Protocol):

TKIP (Temporary Key Integrity Protocol) Scrambles keys to avoid attacks Changes temporal keys every 10,000 packets RC4 streaming cipher (same one used in WEP) 48-bit Initialization Vector Uses MIC or Message Integrity Code

Thank You!:

Thank You!

authorStream Live Help