ITM 301 notes segment
ITM 301 notes segment
Encryption: mathematical codes (ciphers) used to scramble data into a format that can only be read by reversing the cipher/ decrypting the data for
the purpose fo keeping data private
- last layer of defense against data theft
- CIA (Confidentiality, Integrity & Availability Triad): three principles of the standard security model and evaluation standards for encryption
methods
● Confidentiality: data can only be viewed by its intended recipient/ at intended destination
● Integrity: data is not modified between transmission and receipt
● Availability: data is available and accessible to the intended recipient when needed
↳ sender is responsible for successful delivery of data
- Encryption Methods:
★ Key Encryption: original data’s bits are encoded using a key (random string of characters) to scramble the data
↳ generates a unique and consistently sized data block called ciphertext
↳ key is created according to a specific set of rules (algorithms)
1. Private key encryption / symmetric encryption
- data is encrypted using one single key that only the sender and receiver know
- not the most secure b/c the sender must share the key with the recipient → sharing the key leaves opening for
interception (data is in motion)
2. Public key encryption / asymmetric encryption
- data is encrypted with a private key known only to the user
- data is then decrypted with a public key that is mathematically related to the private key (made available through a
third party source like a public key server)
- ensures data integrity → public key will only work if the data has not been tampered with
- ensures data confidentiality → only the intended recipient can decrypt the data
- key pair: the combination of a public key and a private key
- Can also be done alternatively where the sender encrypts message with a public key and the recipient must decrypt it
using a matching private key
Digital certificate: a small file containing a user’s verified identification information and their public key
Certificate Authority (CA): organization that issues, maintains and validates digital certificates
PKI (public-key infrastructure): the use of certificate authorities to associate public keys with certain users
Authentication: process of ensuring that a user, device, or application is who they say they are
Remote Access: service that allows a client to connect with and log onto a server, LAN or WAN in a different geographical location
- remote client can access files, applications, and other shared resources
- client and host need a transmission path + appropriate software to complete remote connection and exchange data
- requires RAS (remote access server):
➔ Software that enables devices to accept a remote connection and grant privileges to the network’s resources
➔ software must be installed on both the remote client and the remote access server
➔ Two types of remote access server
1. Dedicated devices
- devices that are solely dedicated as an RAS to run software that
performs client authentication
- compares and matches a client’s credentials with the credentials in a
client database
- enables client to log onto network or other resource
FTPS (FTP Secure or FTP over SSL): added layer of protection for FTP using SSL or TLS
- encrypts both the control (port 21) and data channels (port 20)
- FTPS listens at port 21, but requires two data channels (ports 989 and 990)
- can also be configured to negotiate data channels within a defined port range
- Can be difficult to manage through a firewall
TFTP (Trivial FTP): similar to FTP but provides no authentication for transferring files
- Uses UDP at the transport layer
- ** not safe for communications over the internet
- Listens at port 69 and negotiates a data channel for each connection
- Can’t give users access to directory information
- Limits file transfers to 4 GB
- Requires little memory
- mainly used behind the scenes by machines to transfer boot and configuration files
- TFTP Server:
➔ Used to remotely boot devices that dont have their own hard drives
➔ Collect log files
➔ Back up and update network device configuration files
Terminal Emulation
Terminal Emulator:
- software that allows a user on a client computer to control a host/ server computer across a network connection
- hosts can allow clients a variety of privileges (Ex. viewing, running apps, modifying data files, sending keystrokes and mouse clicks etc)
- Command line (CLI) software that provides terminal emulation
★ Telenet (protocol)
- terminal emulation utility
- Used by Telenet client/server apps
- Allows a user to control a computer remotely
- **provides minimal security when establishing a connecton (poor authentication)(
- ***no security for data transmission (no encryption)
- Connection is created from client computer using telenet command, followed by the IP address of the device you wish to
connect to
↳ Must then enter a password to complete the connection
- close a telenet session using quit command
★ SSH (Secure Shell)
- Listens at port 22
- collection of protocols
- performs authentication and encryption
- Encrypts data exchanged throughout session
- SSH must be running on both client and server to establish secure connection
- allows user to…
➔ Securely log onto host
➔ Execute commands on host
➔ Copy files to or from host
- Guards against security threats…
➔ Unauthorized access to a host
➔ Interception of data in transit
➔ IP spoofing: attacker attempts to hide their identity or impersonate another device by changn the IP header
➔ DNS spoofing: hacker forges name server records to falsify thor host’s identity
- SSH allows for password authentication using public and private keys
➔ Step 1: run ssh-keygen command to generate public and private keys → keys saved on 2 different encrypted files
on hard disk
➔ Step 2: transfer public key to an authorization file on the host you want to connect to
➔ Step 3: connect to to host via SSH → exchange public keys → keys match? → connection complete
★ VDI (Virtual Desktop Infrastructure): creates and connects you to a fully virtualized instance of a computer
- Different from traditional RDP connection
- Targets only virtual machines (VMs)
- can use RDP to create the connection to each virtual machine (VM)
- more flexibility → options ot access VMs running on many different OSs + different configurations of installed applications
➔ Persistent instances: changes and files are saved when user logs out of remote desktop → will be there upon return
➔ Non-persistent instances: desktop resets each time someone signs in
★ RDS (Remote Desktop Services):
- uses RDP to allow multiple users to access the same virtual or physical Windows Server system at one time
- can provide access to entire Server OS or just one single application
- cheaper than VDI
- Harder to manag → limited customization
Out-of-Band Management: relies on a dedicated connetion (wired or wireless) between the admin’s computer and each critical network device
(router, firewall, server etc) to establish remote control
- Administrators can remotely
➔ Power on a device
➔ Change firmware settings
➔ Reinstall operating systems
➔ Monitor hardware sensors
➔ Troubleshoot boot problems
➔ Limit ntwrk user’s access to management functions
➔ Manage devices even when other parts of the network are down
VPN (Virtual Private Network): network connection that’s encrypted from end to end, creates a private connection to a remote network
- Likenened to a tunnel
- Relies on public transmission networks already in place (ex. Internet)
- Cheaper → dont have tp lease private point-to-point connections between each office and national headquarters
- router-based VPN → most common on UNIX networks
- server-based VPN → most common on Windows networks
- Can be tailored to unique distance, user and bandwidth needs → each configuration is unique
- VPN model classifications (3)
1. Site to Site VPN:
- At each site, a VPN gateway (router, firewall, remote access server) on the edge of the LAN establishes a secure conections
- Each site must have a static IP address
- Secure tunnels connect multiple sites on a WAN
- VPN encrypts and encapsulates data exchanged over the tunnels
2. Client to Site VPN:
- hosts/clients establish communication tunnels with a private network through a VPN headend (a gateway at the edge of the
LAN)
- tunnel between client and headend encrypts and encapsulates the
data
- Only the VPN headend must have a static public IP address
- enables remote access
VPN Tunnelling: process by which special VPN protocols encapsulate higher-layer protocols
- Ensures that a VPN can carry all types of data privately over any kind of connection
- Complete frames are encrypted, encapsulated and transported inside normal IP packers and data link layer frames
↳ inner frame travels across the network as a payload inside another frame
- many tunnelling protocols operate at data link layer (layer 2) to encapsulate VPN frame inside a network lawyer packet
- Some work at network layer (layer 3) → enables additional features, particularly for site to site
- Most tunneling protocols rely on additional encryption protocols
● Full Tunnel VPN:
- Captures all network traffic (whether destined for internet or corporate network)
- Client has no access to local network
- Client is assigned IP address from remote network
● Split Tunnel VPN:
- Only captures traffic destined for corporate network
- Client can communicate directly with local network network resources and internet
- Client is assigned IP address from local network
➔ benefits
- reduces amount of traffic routed through corporate network → increases user privacy and decreases latency
(network delay)
Multipoint VPNSs
- When multiple branch offices need VPN tunnels to each other, a mix of client-to-site and site-to-site models is used.
IPsec and Tunneling: IPsec often provides encryption for other tunneling protocols, enabling more flexibility in VPN configurations.
● Remote access devices must be up to date with patches, anti-malware software, and a firewall
● Device access must be controlled by a strong password or biometric measures
● Passwords must be strong and must be changed periodically
● The device’s internal and external storage devices must be encrypted
● Company and customer data must be kept secure
● The loss or theft of any devices used for remote access must be reported immediately
● Encrypted VPN software must be used to remotely access company network resources
● While remotely connected to the company network, the device must not be connected to the open Internet or any other network not fully
owned or controlled by the employee
● Remote sessions must be terminated when not in use
Troubleshooting Network Issues
Troublshooting Utlities:
● netstat: displays all TCP/IP statistics and details about TCP/IP components and connections on a host
- displays…
➔ the port on which a TCP/IP service is running
➔ Which network connections are currently established for a client
➔ How many messages have been handles by annetwor interface since it was activated
➔ How many data errors have occurred on a particular network interface
● tracert or tracereoute \
- Both limit the TTL of their probes (repeated tria messages) → triggers routers along route to return specific info
↳ by default, they send three proves with each iteration
- tracert: uses ICMP echo requests to trace the path from one networked node to another
↳ identifies all the intermediate hops in between two nodes
↳ sends an ICMP echo request to the destination node and listened for an echo reply from that node
↳ Windows
- traceroute: uses UDP datagrams or TCP SYN messages for echo requests
↳ sends UDP messages to a random, unused port on the destination node, and listened for an ICMP “Port Unreachable” error
message in response
↳ Linux, UNIX, OS X
Transmission Basics
Frequency: highway analogy → the number of traffic light cycles per minute that allow vehicle traffic to pass
- max frequency is important b/c it affects how quickly one can transfer data over a cable or wireless connection
- max frequency can sometimes be called bandwidth → indicates the possible range of frequencies up to the maximum
● cabling frequency
- the number of times in a second that an electrical signal can change states (ex. from positive to negative charge)
- measured in MHz (megahertz) or GHZ (gigahertz)
- dont need to be tightly contained as wireless signals → physical cable limits the dispersion of the signal
● wireless frequency
- the number of times in a second that an electrical signal can change states
- must be contained within a specific range of the electromagnetic spectrum to prevent signal interference from other signals using
nearby frequencies
- measured in MHz (megahertz) or GHZ (gigahertz)
Bandwidth: highway analogy → number of lanes on the highway (can increase bandwidth by adding more lanes)
- the amount of data one could theoretically transmit during a period of time
↳ the number of lanes available for data transfer (highway analogy)
↳ takes into consideration frequency, distance, SNR (signal to noise ratio)
- measured in Mbps (megabits per second)
Transmission Flaws
Attenuation: the loss of a signal’s strength as it travels away from the source
- can be boosted using a repeater: generates a digital signal in its original form w/o the
noise
Latency: the brief delay between the moment when data leaves the source and when it arrives
at the destination → accounted for by the traveling of the electrons
- issues caused by latency
● PDV (Packet Delay Variation) or jitter:
- packets arrive out of order due to varying amounts of delay in the transmission of each packet
● Premature ending of transmission:
- node assumes no more data is coming if it does not receive rest of data within a certain amount of time
- measured by
● RTT (Round Trip Time): the length of time it takes for a packet to go from sender to receiver and then back to receiver again
- measured in milliseconds
- affected by
➔ cable length
➔ Intervening connectivity devices (ex. Modems, switches)
➔ cable limitations
➔ number of transfers between devices
➔ noise
➔ Traffic congestion
➔ Processing delays
➔ collisions from other messages
➔ Conversion from one transmission type to another
Duplexes
- Device manager:
➔ used in Windows to configure an NIC speed and duplex settings
➔ speed and duplex mismatch: results when a user selects a speed and duplex that is not supported by a neighbouring device
Multiplexing
Multiplexing: form of transmission that allows multiple signals to travel simultaneously over one medium
- increases the amount of data that can be transmitted in a given timespand / over given bandwidth
- medium’s channel is logically separated into many smaller subchannels
- multiplexer (mux): device that combines many signals on a channel → on sender’s end
- demultiplexer (demux): device that separates combined signals → on receiving end
Copper Cable
Coaxial Cable:
- central core can have solid metal wire or several thin strands of metal wire to carry electromagnetic signal
- cable with a central metal core ( often copper) surrounded by
➔ a plastic insulator → protects the core from the metal shielding (wire would short
circuit if they made contact)
- can be made of PVC (polyvinyls chloride)
➔ braided metal shielding → protects signal against noise, acts as s ground
➔ sheath / jacket / outer covering → protects from physical damage
- can be made of PVS or other fire resistant plastic
Cat 5 100 mbps 100 MHz - minimum standard requirement for Fast Ethernet
(Fast Ethernet)
Cat 6 - 1 Gbps 250 MHz - plastic core added to prevent crosstalk between twisted pairs in the cable
- 10 Gbps (only - foil insulation covering each bundle of wire pairs
on shorted - fire resistant plastic sheath
distances)
Cat 7 - 10 Gbps 600 MHz - each pair is wrapped in its own shielding, then packaged in additional shielding
- 100 Gbps (only beneath the sheath
on shorter - supports higher frequencies
distances) - needs sophisticated connectors (GG45 or TERA)
- thicker and less flexible
Cat 7a 40-100 Gbps at 1000 MHx - uses increased bandwidth to offer higher data rates
(augmented) very short - needs specialized connectors
distances
Cat 8 - 25 Gbps 2 GHz - already widely available for consumers to use in their home networks
- 40 Gbps - further improved and extensive shielding
(longer - best for short distance backbone connections within data centre
distances than - up to 40 Gbps over 30 metres
Cat 7) - connectors are backward compatible with Cat 5e and Cat 6
★ STP (Shielded Twisted Pair)
- has braided copper shielding
↳ shielding acts as barrier against external electromagnetic interference
↳ shielding contains the electrical energy of the signals inside
↳ must be grounded → enhances protective effects, prevents reflection issues
- uses RJ-45 (registered jack 45) modular connectors and data jacks
- can transmit at rates faster than 10 Gbps
- max segment length 100 metres (1 Mbps – 10 Gbps)
Cable Pinouts
Auto-MDI-X ports: ports on newer devices that automatically negotiate the transmit and receive wires between devices
- Will still work even if youre not using the correct cable (may be subject to performance issues though)
Loopback adapter: attaches to a port and crosses the transmit line with the receive line to create a closed loop
- Tricks computer into thinking its connected to a network
- used to tests a port or cable for connectivity
Fiber-Optic Cable
- Plastic buffer outside the cladding → protects both the cladding and the core
↳ buffer is opaque and absorbs any light that may escape
- Strands of Kevlar (polymeric fiber) current the plastic buffer for further protection
- Plastic sheath covers strands of Kevlar
- data is transmitted through the central fibers via pulsin flight sent from one of two sources
● Laser: intense, focused light → travels very long distances, high throughput
● LED (light emitting diode) → cool-burning, long lasting technology → used on shorted distances
- operates in simplex fashion → each strand of glass usually transmits in one direction only
↳ two strands needed for full-duplex communication
➔ Zipcord cable:
- two strands of glass are are combined side-by-side in conjoined jackets
- spans short distances (ex. Connecting server and switch)
- sends data on one port and receives data through another port
➔ Bidirectional transmission:
- Each fiber cable carries data in both directions
- uses newer WDM technology to separate the data travelling in each direction on different wavelengths of light/ colours
- Requires BiDi / WDM transceiver: special end connection equipment for bidirectional transmission on fiber optic cabling
↳ more expensive
↳ reduce amount of fiber cabling needed by half
Characteristics of Fiber Optic Cable
● Throughput
- can transmit data at rates up to 100 gigabits per second per chanel
- amazing throughput because light experiences almost no resistance
- light based signals can be transmitted at faster rates with fewer errors compared to electrical pulses
● Cost
- most expensive wired transmission medium
- Expensive equipment (5x more $)
- Expensive installation (skilled installers required)
● Noise Immunity:
- Light is immune to EMI (electromagnetic interference)
● Size and Scalability
- Fiber optic cable segment lengths range from 2 to 40, 000 meters
- Optical loss:
↳ degradation of a light signal after it travels a certain distance away from it source (reason for max limit)
↳ imagine flashlight getting dimmer in the distance
● Excellent security
● Can carry signals for much longer distances before needed repeaters
- Fusion splicer: melts the tip of two fibers together so light can pass cleanly through the joining (creates splices)
- Fiber stripper: strips off the outer layers of a fiber optic cable
- Fiber cleaver: cuts a clean slice through fiber strands
Fiber Connectors
MMF Connectors
- classified by number of fibers they connect
SMF Connectors
- classified by the size and shape of the ferrule
● Ferrule: extended tip of a connector that makes contact with the
receptacle in the jack or with another connector
- designed to reduce back reflection using shapes and polishes on the ferrule
● Back reflection: when the light signal returns back into the fiber
that is transmitting the signal
- measures as optical loss in dB (decibels)
- reduced by shapes on SMF ferrules
➔ UPC (ultra physical contact)
- tips polished into a round surface
- ↳ shape worsens back reflection (light reflects directly back into the transmitting signal)
↳ allows two internal fibers to meet
↳ increases efficiency over older types of connections
Media Converter:
- hardware that enables networks or segments running on
different media to interconnect and exchange signals
- completes the physical connection between two different
media → converts one to the other
- must select the correct type of media converter for network
Fiber Transceivers
Transceiver:
- modular interfaces that can be plugged into switches to upgrade its interface at any time
- Hot-swappable: describes component that can easily inserted without disruption operations
- types of transceivers include…
● GBIC (Gigabit interface converter)
- obsolete
- older standard for transceivers
- contained RJ-45 ports (copper cables) and SC ports (fiber optic)
● SFP (small form-factor pluggable)
- same function as GBIC but smaller size
- More ports on body
- Supports 1 - 5 Gbps connections
-
● XFP (10 Gigabit small form-factor pluggable)
- Supports up to 10 Gbps
- Slightly bigger than SFP
- lower power consumption than SFP+
● SFP+
- same size as SFP
- Supports 16 Gbps
- widely used today
● QSFP+
- 8 data channels
- Supports up to 400 Gbps (8 x 50 Gbps)
- highest speed format is QSFP56-DD
- To avoid using the incorrect transceiver, you must pair these devices based on supported speeds and protocols
- Installing a transceiver can be achieved by sliding the transceiver into a socket on the back of the connectivity device
- Most transceivers come with a tab or latch system and keyed so that they will slide into the socket when aligned properly
Standard Ethernet Type Max Bandwidth Max Segment Distance Physical media
(transmission)
1000 BASE-LX Gigabit Ethernet 1000 550 meters for MMF MMF or SMF
5000 meters for SMF
10G BASE-LR 10-Gigabit Ethernet 10, 000 10, 000 meters SMF
Wavelength mismatch
- occurs when transmissions are optimized for one type of cable but sent over a different type of cable
Dirty connectors
- If fiber connectors get dirty, signal loss and other errors can start to cause problems
Link loss
- the power of a light signal emitted at one end of a connection is subjected to many losses along its way to the other end
- These include losses from distance along the cable, losses from multiplexing, and losses from imperfect connections, patches, or splices
- optical link budget: the calculation of all anticipated losses along the length of a connection
● You can start troubleshooting a network connection problem by checking the network connection LED status indicator lights
- A steady light indicates connectivity
- A blinking light indicates activity
- A red or amber light might indicate a problem
● If a cabling issue is suspected, you need to know which tools are designed to analyze and isolate
problems
Baseband: transmission form where digital signals are sent through direct current (DC) pulses applies to the wire
- can only transmit one signal or channel at a time
- every device on a baseband system shares the same channel → must wait their turn
Broadband: transmission form where signals are modulated as radio frequency (RF) anaolog waves that uses frequency ranges
-
- can carry multiple signals simultaneously
- span longer distances than baseband
- used for home cable TV
- wireless
RFID 125 - 134.2 kHz **the lowest of several frequency ranged for RFID
(Radio Frequency - electromagnetic fields used to store data on a small chip → RFID tag
Identification) ↳ include antenna that can transmit and receive
↳ included battery
- tag holds 1–8 KB of data
↳ ex. Serial number, credit card info, medical data
- used for inventory managment
- hub: network controller that receives commands from a device and relays the commands to
other smart devices on the network
- Node ID: 1-byte ID that identifies devices on the network
- Network ID: 4-byte ID that identifies entire network
- access point:
↳ the central connectivity device for Wi-Fi clients on a network
- gathers and tracks info from sensors embedded in heart rate monitors, GPS devices and
activity monitoring devices
- can sync data from multiple devices for the same activity (Ex. smart watch, smartphone,
fitness equipment)
- access point:
↳ the central connectivity device for Wi-Fi clients on a network
Channel Management
Antennas
- air provides no fixed path for wireless signals to follow → signals travel without guidance
- Wireless signals are transmitted, receives and controlled differently than wired
↳ starts at the hardware level
Antenna:
- Used for both transmitting and receiving wireless signals
- Two antennas must be tuned to the same frequency to communicate
- receives electrical signals passed to it from a wired conductor and emits them as a series of electromagnetic waves into the atmosphere
- signal moves through the air and eventually reaches its destination where another antenna detects the signal and coverts it back to
current
EIRP (effective isotropic radiated power): theoretical ratio used to measure antenna performance
- Measured in decibels relative to one miliwatt dBm
ERP = transmission power (dBm) — cable loss (dB) + antenna gain (dBi)
RSSI (received signal strength indicator): measures the power of the signal on the receivers end
- Measured in dBm
- Expressed as negative numbers
- Numbers closest to 0 are best (Ex -30 is excellent and -50 is good)
Signal Propagation
Propagation: the way that a wave travels from one point to another
➔ LOS (line of sight): propagation in a straight line
- maximizes the distance for energy used
- Clearest posible signal
- WLANs define operations at OSI layers 1 and two (physical and data link)
- Support the same TCP/IP higher layer protocols (IP, TCP, UDP)
802.11ax (Wi-Fi 6 and Wi-Fi 6E) 2.4 GHz or 5 GHz 9.6 Gbps Indoor: 70 m
* start of OFDMA Outdoor: 250 m
or 6 GHz (for Wi-Fi 6E only)
Access Method
Association: process by which a wireless device (such as a laptop, smartphone, or any Wi-Fi-enabled
device) connects to a specific wireless access point (AP) to become part of a network
- Function of the MAC sublayer in 802.11 standard
- Works by means of scanning
- Scanning: when a wireless device is on and periodically surveys it surroundings for evidence of
an access point
● Active scanning:
- Wireless client takes initiative
- client device transmits a probe on all available channels
- AP detect the probe and issues its own probe back with all the info the client
needs to associate with the AP
● Passive scanning:
- AP takes initiative
- Wireless client device listens on all channels for a beacon frame (special signal
that the AP issues periodically)
- Beacon frame contains info that a wireless node needs to associate with the AP
including…
↳ SSID (service set identifier): a character string used to identify an access point
- Default manufacturer SSIDs should be replaced with a custom ID for security purposes
- Disguise the nature of the network identified by the SSID
- Minimize confusion for employees using an easily recognised but uncommon SSID
SOHO networks:
- Small office, home office network
- One central AP and some rang eextenders
- AP device often combines switching, routing and other network functions
- can be wireless or wired
- Can be a gateway to the internet
- Can include many different IoT (Internet of Things) devices
↳ all these connected devices in a home create a HAN (home area network)
● Smart speakers:
- Amazon echo, Apple home pod, google home
- Can have personal assistants embedded (siri, alexa)
● Smart thermostat:
- can control temperature remotely from phone
- Program specific settings based on schedule, activity level and weather
● Smart doorbell:
- Monitors entryway for movement
- Can be filtered to nly recognize certain types of movement
- Can talk to visitors remotely by video mic
● Smart fridge
- Used RFID or barcode tracking to detect items stored inside fridge
- alerts users when items running low
● Securtiy camera
- Sends alerts and video feeds through wifi to a smartphone app
- User can remotely monito areas
● Offoardng
- Removing the agent from the device
- Admin would do this for security reasons if device is lost or stolen
- Can do so remotely → clear device of important info, permissions and apps without having it physically
WPA - dynamically assigns each - uses Micheal message - assigns every uses widely used
(Wi-Fi Protected transmission its own kwy integrity code to ensure transmission its own key encryption cipher RC4
Access) - uses TKIP (temporal key that upcoming packets are (Rivest Cipher 4)
integrity) scheme for encryption coming from the source
key generation and management they say they are
WPA2 - stronger sta confidentiality - CBC-MAC uses block none Uses AES (Advanced
(Wi-Fi Protected methods thna WPA cipher algorithm to Encryption Standard) to
Access, version 2) - uses CCMP (Counter Mode ensure packets are coming provide faster and more
with CBC [Cipher Block from the source they say secure encryption than
Chaining]) Protocol they are TKIP
↳ improves wireless security for
newer devices
Personal and Enterprise
Adaptations of EAP:
● EAP-TLS:
- EAP using TLS to protect and encrypt communication
- also used PKI (public key infrastructure) certificated to exchange public keys and authenticate supplicant and server
● PEAP (Protected EAP)
- Tunnel based encryption
- Creates an encrypted TLS tunnel between supplicant and server before proceeding with EAP process
- Also called the ‘outer method’
● War Driving
- Hacker drives around with a laptop or phone configured to receive and capture wireless transmissions
- Effective for obtaining private info
● War Chalking
- One hacker discovered vulnerable acces points and make the info public by drawing symbols on the sidewalk in chalk
- Symbols could indicate the access points SSID and whether its secured or not
● Evil Twin
- Device connects to a network and sets up a rogue access point that impersonates the actual AP
- When other users try to associate to the network, they may connect to the rogue access point/ evil twin AP without your knowledgd
and gain access to steal your data or access a network that trusts your system
● WPA Attack
- Intereption of network keys communicated between clients and accep points
● WPS Attack
- attack facilitated by the WPS (Wi-Fi Protected Setup) security setting that is available on some consumer-grade APs
- WPS rewures a PIN that can be easily cracked using a brute force attack that attempts as many possible character combinations to
find the right one
- The PIN feature in WPS should always be disabled
● Bluejacking
- A connection is used to send unsolicited data
● Bluesnarfing
- A connection is used to download data without permission
Spectrum analyzer:
- Device that assess the quality of a wireles signal by scanning a band of frequencies for signals and noise
- can determine when interference is the greatest
Wi-Fi analyzer:
- software that evaluates the Wi-Fi network availability
- Helps to optimize the Wi-Fi signal settings and identify threats
Avoid Pitfalls
When you cant get the Wi-Fi client to connect to the AP…
● Wrong SSID
- The client must select the correct SSID
- AP may not broadcast SSID
- Workstation may not be configured to look for access points
- May have to entwer SSID manually → SSIDs are case sensitive!
● Encryption protocol mismatch
- Wireless client must be configured to use and allow the same encryption protocol that AP uses
● Incorrect passphrase
● Static Channel utilization
- Some client devices are configured to use only a certain channel or frequency
- Client will be unable to connect to AP on different frequency or channel
● Mismatched RF band
- Some wireless devices are designed to only use one specific Wi-Fi band
- Need to use an AP that offers Wi-Fi on that band (Ex. 5 GHz band)
● Mismatched 802.11 standards
- Access point and clients must both be set to communicate on the same Wi-Fi standard
● Long AP association time
- user may be trying to connect from the very edge of the networks covered range
- user may be moving throughout the area while trying to connect and forcing their device to frequently reassociate with a new AP