02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

356 Chapter 15 ■ Wireless Networking<br />

(Counter Mode with Cipher Block Chaining Message Authentication Code Protocol).<br />

The standard also comes in a version that uses stronger systems such as Extensible<br />

Authentication Protocol (EAP), TKIP, and AES (with longer keys).<br />

■ WPA2 Enterprise is a version that incorporates EAP standards as a way to strengthen<br />

security as well as scale the system up to large enterprise environments.<br />

■ TKIP is used as an enhancement to WPA over WEP.<br />

■ AES is a symmetric-key encryption, used in WPA2 as a replacement for TKIP.<br />

■ EAP is incorporated into multiple authentication methods, such as token cards,<br />

Kerberos, and certificates.<br />

■ Lightweight Extensible Authentication Protocol (LEAP) is a proprietary WLAN<br />

authentication protocol developed by Cisco.<br />

■ Remote Authentication Dial-In User Service (RADIUS) is a centralized authentication<br />

and authorization management system.<br />

■ 802.11i is an IEEE standard that specifies security mechanisms for 802.11 wireless<br />

networks.<br />

■ CCMP uses 128-bit keys, with a 48-bit initialization vector (IV) for replay detection.<br />

Let’s look at some of these protocols a little more closely so you can gain a better<br />

understanding of them. We’ll start by looking at WEP.<br />

WEP Encryption: A Closer Look<br />

WEP is the oldest of the wireless encryption protocols and is also the most maligned of<br />

all of the available methods. When originally introduced and integrated into the 802.11b<br />

standard, it was viewed as a way of providing security of data transmissions more or<br />

less on a par with that of wired networks. As designed, WEP made use of some existing<br />

technologies, including RC4, as encryption mechanisms. Although WEP was intended to<br />

provide security on the same level as wired networks, it failed in that regard.<br />

Pay particular attention to the WEP security protocol as you will be<br />

expected to understand how it works. Know its flaws and vulnerabilities,<br />

and be able to describe why these problems arise.<br />

First you need to understand what WEP was originally designed to provide. WEP was<br />

intended to achieve the following:<br />

■ Defeat eavesdropping on communications and attempts to reduce unauthorized<br />

disclosure of data.<br />

■ Check the integrity of data as it flows across the network.<br />

■ Use a shared secret key to encrypt packets prior to transmission.<br />

■ Provide confidentiality, access control, and integrity in a lightweight, efficient system.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!