WIRELESS AUTHENTICATION METHODS
· Built on RC4 – uses a
24-bit IV – PSK (Pre-Shared Key)
· Prone to IV (Initialization
Vector) attack
· Built on RC4 – uses
TKIP (Temporal Key Integrity Protocol)
· Personal Mode (PSK) or
Enterprise Mode (with RADIUS)
· The PSK is prone to
brute force attacks
· Built on AES – uses
CCMP
· Personal Mode (PSK) or
Enterprise Mode (with RADIUS)
· The PSK is prone to brute
force attacks
· AES replaced RC4, CCMP
replaced TKIP
- Built on GCMP-256 (Galois/Counter Mode Protocol)
- Replaces PSK with SAE (Simultaneous Authentication of Equals)
- Connection is generally used with a pushbutton
- If there is no push button, use the 8-digit PIN at the bottom of the AP
- Prone to a brute force attack, can be broken in less than 11,000 attempt
- Tools used for cracking WPS: Reaver, Wifite, Wash
- Using this method requires a RADIUS server
- Authentication can be accomplished with a username & password, smart card, or token
- Authentication is used against an enterprise directory service / AAA server / RADIUS
- 802.1x requires a Supplicant, Authenticator, and Authentication server (AAA / RADIUS)
- Certificates are needed on both the server and wireless device (Supplicant)
- Provides mutual authentication
- Authenticates the user – uses an enterprise directory service
- Certificate on the server only
- Authenticates the user - uses an enterprise directory service
- End-to-end protection of authentication credentials
- Certificate on the server only
- Uses TLS
- Authenticates the user – uses an enterprise directory service
- End-to-end protection of authentication credentials
- Does not require certificates
- Replaced with EAP-FAST
- Do not use certificates
- Replaced LEAP
Uses
the native 802.1x client (Supplicant)
Each
organization has a RADIUS server and joins a mesh
No comments:
Post a Comment