Please enable JavaScript.
Coggle requires JavaScript to display documents.
wirless attacks - Coggle Diagram
wirless attacks
wpa 802.11i
enterprise wpa
personal wpa
temporal key integrity protocol encryption
generate message integrity check for each transmission to protect messages
generate key for each packets
use key longer than 128
preshared key authentacion psk
after ap configured client must have same key
use passphrase to generate key
devices that have generated key configured automatically
WPA Vulnerabilities
key mnagment :
key is exchanged without security protection
key must b changed on regular basis
wps
pin
ny entering pin sticjkerd on the back of the router the security configuration will be applyed
vulnirabilities
there's no lockout limit to pin (brute force)
last char is calculatedx by checksum
wirless report validty of pin first haldv ean seconf half seperatly
push button
by pushing button security configurt=ations will be applied
rogue access point
unauthorised access poinyt that allows attacker to bypass network configuration
maybe setup behind firewalls
eviltwin
ap created by attacker to try to memic the original access poiunt
intervepting wirless data
attacker can puck signal by intercepting ap
wep protocl used to enusree that only tyrustedoparties view transmission lkey is shared between ap and wirless cli9ent
vulnirabilites
we can oonly use 64 and 128 number to enctrypt initialize vector is 24
avoid predectab;vector paattern
pattern can be predictible
mac filtering
filtering by bolcking or allowing traffo=ic based on mac address of device
vulerable because m=mac address are exchanged in unencrypted format
handeling b=huge traffic is hard