802.11 series of wireless standards
Other wireless standards
Orthogonal Frequency Division Multiplexing (OFDM)
Transmissions media is divided into a series of frequency bands that don’t overlap each other and each can be used to carry a separate signal.
Direct Sequence Spread Spectrum (DSSS)
Is a transmission technology used in local area wireless network transmissions. In this technology, a data signal at the sending station is combined with a high data rate bit sequence, which divides user data based on a spreading ratio. The benefits of using DSSS are resistance to jamming, sharing single channels among multiple users, less background noise and relative timing between transmitter and receivers.
Wireless - Ad-hoc mode
System to system such as two computers.
Wireless - Infrastructure mode
Makes use of a wireless access point (WAP). Clients need to associate with a WAP and disassociate to connect to a different WAP. With a single WAP you have a basic service area (BSA). Communication between this single WAP and its clients is known as a basic service set. If you have multiple WAPs, then you have an extended service set (ESS). Roaming involves clients disassociating from one WAP and associating with another WAP within the ESS.
Basic Service Set Identifier (BSSID)
The MAC address of the wireless access point at the center of the basic service set (BSS).
Wireless omnidirectional antennae
Signal emanates from the source in 360 degrees. Dipole antennas are omnidirectional.
Unidirectional antennae
Allows you to focus the signal in a specific direction. Yagi antennas are unidirectional. Greatly increases signal strength and distance. Parabolic grid antennas are unidirectional and work like a satellite dish. Loop antennas are also unidirectional.
Cantennae
Antenna made from a pringles can
Service Set Identifier (SSID)
A case sensitive text word that is 32 characters in length that identifies a wireless network. SSIDs are broadcast by default but can be hidden by choosing not to broadcast (SSID cloaking).
Open Systems Authentication
No authentication performed by a WAP of the client
Shared Key Authentication
The wireless client participates in a challenge/response authentication with the AP verifying a decrypted key.
War Chalking
Drawing symbols in public areas to indicate open WAPs.
)( indicates an open network, adding a key means it is locked
$ indicates pay for access
W - WEP enabled
Wired Equivalent Privacy (WEP)
Uses 40-232 bit keys 64 bit version uses a 40 bit key 128 bit version uses a 104 bit key 256 bit version uses a 232 bit key Uses RC4 Uses a 24 bit initialization vector Calculates a 32 bit integrity check value (ICV) Easy to crack because attackers can generate enough packets to analyze the IVs and arrive at the key used. Attackers can force dissociation from clients to generate the number of packets needed to analyze for cracking the WEP key.
Wi-Fi Protected Access (WPA)
WPA uses Temporal Key Integrity Protocol (TKIP), a 128 bit key and the client’s MAC address for encryption. WPA changes the key every 10,000 packets. Keys are exchanged using the Extensible Authentication Protocol (EAP) which uses a four way handshake
WPA2
Similar to WPA
WPA2 Personal - uses a preshared key
WPA2 Enterprise - uses Radius for authentication
Uses AES for encryption to ensure FIPS 140-2 compliance
Uses Cipher Block Chaining Message Authentication Code (CCMP) for integrity. CCMP calls them message integrity codes (MICs) and the process is called cipher block chaining message authentication code (CBC-MAC)
Wireless Security Standards
WEP: RC4, 24 Bit IV, 40-232 bit key, CRC-32
WPA: RC4+TKIP, 48 bit IV, 128 bit key, Michael Algorithm+CRC-32
WPA2: AES-CCMP, 48 bit IV, 128 bit key, CBC-MAC(CCMP)
Wireless Threats
Locate wireless networks
WIGLE, Netstumbler, WifiExplorer, WiFiFoFum, OpenSignalMaps, Wifinder, Kismet, (works by channel hopping and can sniff packets and save them to a log file for viewing by wireshark or tcpdump), Netsurveyor, WeFi, Skyhook
AirPCap
USB wireless adapter used for wireless hacking. Works with Aircrack-ng, AirPcapReplay
Wireless Attacks
Rogue Access Point
Evil Twin - set to the same SSID as a legitimate WAP. AKA as a mis-association attack. Faking a well known AP is referred to as a honeyspot attack.
Ad-hoc connection attack
Jam a wireless signal
MAC spoofing - in case a MAC filter is enabled on a WAP, easily done on a Linux machine:
1. ifconfig wlan0 down
2. ifconfig wlan0 hw ether AA:BB:CC:DD:EE:FF
3. ifconfig wlan0 up
Wireless Encryption Attack
Key Re-installation Attack (KRACK)
A replay attack that takes advantage of how WPA2 works. By repeatedly resetting and replaying a portion of traffic, the attacker can eventually learn the full key to encrypt all traffic. An attacker can repeatedly resend the third handshake of another device’s session to manipulate or reset the WPA2 encryption key.