Involves the process of collecting, analyzing, and preserving digital evidence from network devices to investigate security incidents and potential breaches.
Network Forensic
was designed to provide wireless networks with a level of security comparable to wired networks. Uses RC4 for authentication and encryption. Uses static key to encrypt all communications. Very easy to crack.
Wired Equivalent Privacy (WEP)
Intended as an interim solution. Implements the Lightweight Extensible Authentication Protocol (LEAP) and Temporal Key Intergrity Protocol (TKIP) which supports a per-packet key that dynamically generates a new 128 bit key for each packet.
Wi-Fi Protected Access (WPA)
Implements AES for encryption and Counter Mode CBC Mac Protocol (CCMP) for integrity. 2 authentication options preshared key or enterprise. Is backwards compatiable with WAP
Wi-Fi Protected Access (WPA2)
Uses 192 bit encryption and individualized encryption for each user. Uses Simultaneous Authentication of Equals (SAE) for authentication
Wi-Fi Protected Access 3
a zero-knowledge proof protocol
where both parties prove they know a shared password without revealing it
(never sending it on the network). It uses elliptic curve cryptography to
generate a shared key that neither party can predetermine.
Simultaneous Authentication of Equals (SAE)
Speed 2 Mbps
Frequency 2.4 GHz
802.11 Wifi Version
Speed 54 Mbps
Frequency 5 GHz
802.11a Wifi Version
Speed 11 Mbps
Frequency 2.4 GHz
802.11b Wifi Version
Speed 54 Mbps
Frequency 2.4 GHz
802.11g Wifi Version
Speed 200+ Mbps
Frequency 2.4 GHz
802.11n Wifi Version
Speed 1 Gbps
Frequency 5 GHz
802.11ac
Transmits raw bit streams over the physical medium, defining electrical and
physical specifications while handling bit-level transmission.
Physical Layer
Provides node-to-node data transfer, detects and corrects errors in the
physical layer, and defines protocols for flow control between adjacent network nodes.
Data Link Layer
Routes data packets between different networks, performs logical addressing
and path determination, and handles traffic control and packet sequencing.
Network Layer
Provides end-to-end communication control, ensures complete data transfer,
and handles segmentation, flow control, and error control.
Transport Layer
Establishes, manages, and terminates sessions between applications, while
also handling dialog control and synchronization between devices.
Session Layer
Translates data between networking and application formats, handling
data compression, encryption, and format conversion.
Presentation Layer
Provides network services directly to end-users, supports application and
end-user processes, and includes protocols for various services such as HTTP (web), FTP (file transfer), and SMTP (email).
Application Layer
SSH,HTTP, FTP, LPD, SMTP, Telnet, TFTP, EDI, POP3, IMAP, SNMP, NNTP, S RPC, and SET
Application Layer Protocols
Encryption protocols and format types, such as ASCII, EBCDICM, TIFF, JPEG, MPEG, MIDI
Presentation Layer Protocols
SMB, RPC, NFS, and SQL
Session Layer Protocols
SPX, SSL, TLS, TCP, and UDP
Transport Layer Protocols
ICMP, RIP, OSPF, BGP, IGMP, IP,
IPSec , IPX, NAT, and SKIP
Network Layer Protocols