Cont..
However, the increased development of Wireless LAN has
increased the potential threats to the home user, small
businesses and the corporate world.
Unlike a wired network, a WLAN uses radio frequency
transmission as the medium for communication.
This necessarily exposes layer 1 and layer 2 to whoever can
listen into the RF ranges on the network. Wireless insecurity
has been a critical issue since Wired Equivalent Privacy
(WEP), an IEEE standard security algorithm for wireless
networks, was compromised.
5
Cont..
Weak keys:
Itallowsanattackertodiscoverthedefaultkeybeing
usedbytheAccessPointandclientstations
Thisenablesanattackertodecryptallmessagesbeing
sentovertheencryptedchannel.
IV (initialization vector) reuse and small size:
There are 2
24
different IVs
On a busy network, the IV will surely be reused, if the
default key has not been changed and the original
message can be retrieved relatively easily.
14
WPA (Wi-Fi Protected Access)
New technique in 2002
Replacement of security flaws of WEP
Improved data encryption
Strong user authentication
Because of many attacks related to static key, WPA minimize
shared secret key in accordance with the frame transmission
Use the RC4 algorithm in a proper way and provide fast
transfer of the data before someone can decrypt the data.
While more secure than WEP, WPA is still susceptible to
certain attacks.
16
Cont..
WPA2 has immunity against many types of hacker
attacks
Man-in-the middle
Replay
Key collision
Weak keys
Packet forging
Dictionary attacks
18
How to defend when using WPA
Passphrases–theonlywaytocrackWPAistosniffthe
passwordPMKassociatedwiththehandshakeauthentication
process,andifthispasswordisextremelycomplicateditwill
bealmostimpossibletocrack
PassphraseComplexity–selectarandompassphrasethatis
notmadeupofdictionarywords.Selectacomplex
passphraseofaminimumof20charactersinlengthand
changeitatregularintervals
Changerouterdefaultusernameandpassword
19