Network Security & Defense

Wireless Security

40 min

Wi-Fi Security Protocols

WIRELESS SECURITY EVOLUTION ─────────────────────────────────────────────── WEP (1999) → 40/104-bit RC4 — COMPLETELY BROKEN ❌ Can be cracked in minutes with aircrack-ng WPA (2003) → RC4 + TKIP — Improved but still vulnerable ❌ WPA2 (2004) → AES-CCMP — ✅ Secure if strong password Vulnerable to KRACK (Key Reinstallation Attack) PMKID attack captures hash for offline cracking WPA3 (2018) → SAE (Simultaneous Authentication of Equals) ✅ Resistant to offline dictionary attacks ✅ Forward secrecy ✅ Current recommended standard ───────────────────────────────────────────────

Common Wireless Attacks

  • Evil Twin Attack — Rogue AP with same SSID as legitimate network; users unknowingly connect
  • Deauthentication Attack — Force clients off network; capture 4-way handshake for cracking
  • PMKID Attack — Capture PMKID from AP beacon; no clients needed for WPA2 cracking
  • Wardriving — Driving around scanning for unsecured Wi-Fi networks
  • Karma Attack — Respond to probe requests; device auto-connects to attacker AP

Enterprise Wireless Security

  • WPA2/3-Enterprise — Uses 802.1X + RADIUS server for per-user authentication
  • EAP-TLS — Most secure; mutual certificate authentication
  • Network Segmentation — Separate guest/BYOD/corporate Wi-Fi VLANs
  • WIDS — Wireless Intrusion Detection System; monitors for rogue APs

📡 Best Practices

Always use WPA3-Personal or WPA2-AES with a 20+ character passphrase. Disable WPS (PIN method is vulnerable). Use guest networks for IoT devices. Regularly audit connected devices.

Previous
Login to Track Progress Next