Abstract
Security of wireless computer networks was initially secured with the WEP security protocol, which relies on the RC4 encryption algorithm and the CRC algorithm to check the integrity. The basic problems of the WEP are a short initialization vector, unsafe data integrity checking, using a common key, the lack of mechanisms for management and exchange of keys, the lack of protection from the endless insertion of the same package into the network, the lack of authentication of access points and the like. The consequences of these failures are easy attacks against the WEP network, namely their complete insecurity. Therefore, the work began on the IEEE 802.11i protocol, which should radically improve the security of wireless networks. Since the development of a protocol lasted, the WPA standard was released to offset the security gap caused by the WEP. The WPA also relies on RC4 and CRC algorithms, but brings temporary keys and the MIC algorithm for data integrity. The 802.1X authentication was introduced and common keys are no longer needed, since it is possible to use an authentication server. The length of the initialization vector was increased and the vector is obtained based on the packet serial number, in order to prevent the insertion of the same packet into the network. The weakness of the WPA security mechanism is the use of a common key. WPA2 (802.11i) later appeared. Unlike the WPA mechanism that worked on old devices with the replacement of software, WPA2 requires new network devices that can perform AES encryption. AES replaces the RC4 algorithm and delivers much greater security. Data integrity is protected by encryption. Despite progress, there are still weaknesses in wireless networks. Attacks for denial of service are possible as well as spoofing package headers attacks. For now, it is not advisable to use wireless networks in environments where unreliability and unavailability are not tolerated.
Highlights
In the entire history of networking it has never been easier to penetrate the network
Pored sigurnosnih problema sa IEEE 802.11 protokolom, prisutne su softverske ranjivosti operativnih sistema i programa na bežičnim klijentima
Tada bi mogao koristiti alat za menjanje MAC adrese, kao što je SMAC (Spoof MAC) koji mu omogućava da promeni hardversku ili MAC adresu na bilo kom interfejsu na Windows operativnom sistemu
Summary
Ove vrste napada koriste različite ljudske slabosti, kao što su nedostatak savesti, nehat i preterana poverljivost prema strancima. Takođe, fizičke ranjivosti koje napadaču daju direktan pristup na bežične uređaje. To su često najlakše vrste napada koji uključuju:. – upad na bežične uređaje koje su korisnici samostalno instalirali i ostavili nezaštićene,. – socijalni inženjering, napadi gde se napadač predstavlja kao neka druga osoba i navodi korisnike na odavanje informacija o sopstvenoj mreži,. – fizički pristup na pristupne tačke, antene i ostalu bežičnu opremu
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.