2 cissp ® Official Study Guide Eighth Edition



Download 19,3 Mb.
Pdf ko'rish
bet445/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   441   442   443   444   445   446   447   448   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

Conducting a Site Survey
One method used to discover areas of a physical environment where unwanted wireless 
access might be possible is to perform a site survey. A 
site survey
is the process of investigat-
ing the presence, strength, and reach of wireless access points deployed in an environment. 
This task usually involves walking around with a portable wireless device, taking note of the 
wireless signal strength, and mapping this on a plot or schematic of the building.
Site surveys should be conducted to ensure that sufficient signal strength is available at 
all locations that are likely locations for wireless device usage, while at the same time mini-
mizing or eliminating the wireless signal from locations where wireless access shouldn’t 
be permitted (public areas, across floors, into other rooms, or outside the building). A site 
survey is useful for evaluating existing wireless network deployments, planning expansion 
of current deployments, and planning for future deployments.
Using Secure Encryption Protocols
The IEEE 802.11 standard defines two methods that wireless clients can use to authenticate 
to WAPs before normal network communications can occur across the wireless link. These 
two methods are 
open system authentication (OSA)
and 
shared key authentication (SKA)

OSA means there is no real authentication required. As long as a radio signal can be trans-
mitted between the client and WAP, communications are allowed. It is also the case that 
wireless networks using OSA typically transmit everything in clear text, thus providing no 
secrecy or security. SKA means that some form of authentication must take place before 
network communications can occur. The 802.11 standard defines one optional technique 
for SKA known as Wired Equivalent Privacy (WEP). Later amendments to the original 
802.11 standard added WPA, WPA2, and other technologies.
WEP
Wired Equivalent Privacy (WEP)
is defined by the IEEE 802.11 standard. It was designed 
to provide the same level of security and encryption on wireless networks as is found on 


Wireless Networks 
477
wired or cabled networks. WEP provides protection from packet sniffing and eavesdrop-
ping against wireless transmissions.
A secondary benefit of WEP is that it can be configured to prevent unauthorized access 
to the wireless network. WEP uses a predefined shared secret key; however, rather than 
being a typical dynamic symmetric cryptography solution, the shared key is static and 
shared among all wireless access points and device interfaces. This key is used to encrypt 
packets before they are transmitted over the wireless link, thus providing confidentiality 
protection. A hash value is used to verify that received packets weren’t modified or cor-
rupted while in transit; thus WEP also provides integrity protection. Knowledge or posses-
sion of the key not only allows encrypted communication but also serves as a rudimentary 
form of authentication because, without it, access to the wireless network is prohibited.
WEP was cracked almost as soon as it was released. Today, it is possible to crack WEP 
in less than a minute, thus rendering it a worthless security precaution. Fortunately, there 
are alternatives to WEP, namely WPA and WPA2. WPA is an improvement over WEP in 
that it does not use the same static key to encrypt all communications. Instead, it negoti-
ates a unique key set with each host. However, a single passphrase is used to authorize 
the association with the base station (i.e., allow a new client to set up a connection). If the 
passphrase is not long enough, it could be guessed. Usually 14 characters or more for the 
passphrase is recommended.
WEP encryption employs Rivest Cipher 4 (RC4), a symmetric stream cipher (see 
Chapter 6, “Cryptography and Symmetric Key Algorithms,” and Chapter 7, “PKI and 
Cryptographic Applications,” for more on encryption in general). Due to flaws in its design 
and implementation of RC4, WEP is weak in several areas, two of which are the use of a 
static common key and poor implementation of IVs (initiation vectors). Due to these weak-
nesses, a WEP crack can reveal the WEP key after it finds enough poorly used IVs. This 
attack can now be performed in less than 60 seconds. When the WEP key is discovered, 
the attacker can join the network and then listen in on all other wireless client communica-
tions. Therefore, WEP should not be used. It offers no real protection and may lead to a 
false sense of security.
WPA
Wi-Fi Protected Access (WPA)
was designed as the replacement for WEP; it was a tempo-
rary fix until the new 802.11i amendment was completed. The process of crafting the new 
amendment took years, and thus WPA established a foothold in the marketplace and is still 
widely used today. Additionally, WPA can be used on most devices, whereas the features of 
802.11i exclude some lower-end hardware.
802.11i is the amendment that defines a cryptographic solution to replace WEP. 
However, when 802.11i was finalized, the WPA solution was already widely used, so they 
could not use the WPA name as originally planned; thus it was branded WPA2. But this 
does not indicate that 802.11i is the second version of WPA. In fact, they are two com-
pletely different sets of technologies. 802.11i, or WPA2, implements concepts similar to 
IPSec to bring the best-to-date encryption and security to wireless communications.
Wi-Fi Protected Access is based on the LEAP and Temporal Key Integrity Protocol 
(TKIP) cryptosystems and often employs a secret passphrase for authentication. 


478
Chapter 11 

Secure Network Architecture and Securing Network Components
Unfortunately, the use of a single static passphrase is the downfall of WPA. An attacker 
can simply run a brute-force guessing attack against a WPA network to discover the pass-
phrase. If the passphrase is 14 characters or more, this is usually a time-prohibitive proposi-
tion but not an impossible one. Additionally, both the LEAP and TKIP encryption options 
for WPA are now crackable using a variety of cracking techniques. While it is more com-
plex than a WEP compromise, WPA no longer provides long-term reliable security.
WPA2
Eventually, a new method of securing wireless was developed that is still generally consid-
ered secure. This is the amendment known as 
802.11i
or 
Wi-Fi Protected Access 2 (WPA2).
It is a new encryption scheme known as the 
Counter Mode Cipher Block Chaining Message 
Authentication Code Protocol (CCMP)
, which is based on the AES encryption scheme. In 
late 2017, a concept of attack known as KRACK (Key Reinstallation AttaCKs) was dis-
closed that is able to corrupt the initial four-way handshake between a client and WAP into 
reusing a previously used key and in some cases use a key composed of only zeros. Most 
vulnerable wireless devices have been updated or an update is available to resolve this issue. 
For more information, see 
https://www.krackattacks.com/
.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   441   442   443   444   445   446   447   448   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish