From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Wireless attacks
From the course: CompTIA Security+ (SY0-601) Cert Prep: 8 Network Security Design and Implementation
Wireless attacks
- [Instructor] Earlier in this course, I discussed the options for wifi encryption and how the use of wired equivalent privacy or WEP is insecure. Let's dig into that a little further and discuss how an attacker might take advantage of a WEP network. When you set up a new WEP connection, the computer and access point exchange an initialization vector or IV that helps get the connection established. This IV is sent without encryption because it's used to create the encrypted channel. If an attacker captures enough different initialization vectors, they can reconstruct the encryption key. Fortunately, you don't need to know the mathematical details on how this attack works because they are somewhat complicated, but it is important that you know that WEP attacks rely upon capturing initialization vectors as you prepare for the exam. WPA like WEP relies upon the RC4 encryption algorithm. If you recall, the problem…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
Denial of service attacks4m 15s
-
(Locked)
Eavesdropping attacks4m 12s
-
(Locked)
DNS attacks3m 30s
-
(Locked)
Layer 2 attacks2m 3s
-
(Locked)
Network address spoofing3m 38s
-
(Locked)
Wireless attacks2m 59s
-
(Locked)
Propagation attacks4m 19s
-
(Locked)
Preventing rogues and evil twins2m 50s
-
(Locked)
Disassociation attacks2m 10s
-
(Locked)
Understanding Bluetooth and NFC attacks2m 2s
-
(Locked)
RFID security2m 25s
-
(Locked)
-
-
-