Information Technology Reference
In-Depth Information
2.2.BruteForce/DictionaryWEPCracking ...................... 231
2.3.TheFMSAttack................................... 232
2.4.EnhancementstotheFMSAttack ......................... 233
2.5.InjectingPacketsforFasterWEPCracking .................... 235
2.6.EncryptedPacketInjection............................. 236
2.7. 802.1x Authentication ............................... 237
2.8.EAP-LEAPAttack ................................. 239
2.9.EAP-MD5Attack.................................. 240
3. WPA Background and Introduction ........................... 240
3.1.TheWPA-PSKAttack ............................... 241
4.OtherAttackModes ................................... 242
4.1. VPNs: Point-to-Point Tunneling Protocol ..................... 242
4.2.AttacksonPPTP .................................. 244
4.3. Denial-of-Service Background and Attacks .................... 244
4.4.Man-In-The-MiddleAttacks ............................ 246
5.Conclusion ........................................ 246
Appendix A: Wireless Security Utilities by Operating System and Function ..... 247
AppendixB:KoreK'sNewWEPCrackingCode.................... 248
References......................................... 250
1.
The Wireless Landscape
Wireless networking is one of the most recent technologies whose usage has ex-
ploded in the last decade. The operational metaphor behind wireless technology is
mobility. The concept of wireless networking dates back at least as far as ALO-
HANET in 1970. While this project is now of primarily historical interest, the online
overview is still worth reading ( http://en.wikipedia.org/wiki/ALOHA_network ) . The
concept of ALOHANET spanned many of the core network protocols in use today,
including Ethernet and Wireless Fidelity (aka WiFi ® ). ALOHANET was the precur-
sor of first generation wireless networks.
Wireless technologies may be categorized in a variety of ways depending on their
function, frequencies, bandwidth, communication protocols involved, and level of
sophistication (i.e., 1st through 3rd generation wireless systems). For present pur-
poses, we'll lump them into four basic categories:
(1) Wireless Data Networks (WDNs),
(2) Personal Area Networks (PANs),
(3) Wireless Local Area Networks (WLANs), of which the newer Wireless
Metropolitan Area Networks (WMANs) and Wireless Wide Area Networks
(WWANs) are offshoots, and
(4) satellite networks.
Search WWH ::




Custom Search