Flashcards - M8: Wireless Network Security
Published on January 19, 2025
What are common wireless encryption standards?
WEP, WPA, WPA2, WPA3 (WEP is weakest, WPA3 is most secure).
How does WPA2-PSK authentication work?
It uses a pre-shared key (passphrase) and a 4-way handshake to generate unique session encryption keys.
What is a rogue access point attack?
Setting up a fake Wi-Fi AP mimicking a legitimate one to capture traffic or credentials.
Describe “wardriving.”
Driving around with a Wi-Fi-enabled device to discover open or poorly secured networks.
Why is WPS vulnerable?
WPS has a known PIN vulnerability that can be brute-forced, bypassing otherwise strong WPA2 security.
Name a tool commonly used for wireless auditing.
aircrack-ng for capturing and cracking Wi-Fi passphrases.
How do Evil Twin attacks work?
Attackers create an AP with the same SSID as a trusted network, tricking users into connecting to the malicious AP.