Please enable JavaScript.
Coggle requires JavaScript to display documents.
Wireless Network Hacking - Coggle Diagram
Wireless Network Hacking
Encryption
WEP
provide confidentiality
stream cipher RC4
weak since it uses small IVs allowing decode of shared key
WPA
replaces WEP's weak encryption
uses TKIP
uses RC4 and defeats well known attacks
WPA2
replaces WPA's weak cipher
uses AES!
replaces TKIP with CCMP
WPA3
dragonfly handshake, protects against dictionary attacks
terms
access point or WAP
SSID
BSSID
GSM
Bandwidth
hotspot
Standards
802.15.1
Bluetooth
802.15.4
Zigbee
popular IoT connection protocol
802.16
WiMAX
802.11 and all its children
Bluetooth Hacking
BlueSmacking
BlueJacking
BluePrinting
BlueSnarfing
BlackJacking
WiFi authentication
OSA
SKA
IEEE 802.1x
AAA protocols
Radius
commonly used by ISPs
EAP
Diameter
replaced RADIUS
IPsec or TLS
TACACS
TACACS+
wireless attacks
de-authentication attack
capture handshake traffic
evil twin
rogue AP outside place with the legit one
rogue access point
fake AP with same SSID as legit one
KRACK
against WPA and WPA2