WiFi Technology

  1. WiFi Security
    1. Security Threats and Vulnerabilities
      1. Eavesdropping
        1. Man-in-the-Middle Attacks
          1. Denial of Service Attacks
            1. Rogue Access Points
              1. Evil Twin Attacks
              2. Legacy Security Protocols (Deprecated)
                1. Wired Equivalent Privacy (WEP)
                  1. RC4 Encryption
                    1. Initialization Vector Issues
                      1. Key Management Problems
                        1. Encryption Weaknesses
                        2. MAC Address Filtering
                          1. Implementation Methods
                            1. Security Limitations
                              1. Spoofing Vulnerabilities
                              2. SSID Hiding (Cloaking)
                                1. Implementation
                                  1. Effectiveness and Drawbacks
                                    1. Security Through Obscurity
                                  2. Wi-Fi Protected Access (WPA)
                                    1. Temporal Key Integrity Protocol (TKIP)
                                      1. Key Mixing
                                        1. Message Integrity Check
                                          1. Improvements over WEP
                                            1. Known Vulnerabilities
                                            2. WPA Authentication
                                              1. Pre-Shared Key Mode
                                                1. Enterprise Mode
                                              2. Wi-Fi Protected Access II (WPA2)
                                                1. Advanced Encryption Standard (AES)
                                                  1. Block Cipher Operation
                                                    1. Key Sizes
                                                      1. Encryption Strength
                                                      2. Counter Mode Cipher Block Chaining Message Authentication Code Protocol (CCMP)
                                                        1. Encryption and Authentication
                                                          1. Integrity Protection
                                                            1. Replay Protection
                                                            2. WPA2 Authentication Modes
                                                              1. Personal Mode (PSK)
                                                                1. Enterprise Mode (802.1X)
                                                              2. Wi-Fi Protected Access 3 (WPA3)
                                                                1. Simultaneous Authentication of Equals (SAE)
                                                                  1. Dragonfly Key Exchange
                                                                    1. Forward Secrecy
                                                                      1. Enhanced Authentication
                                                                      2. Enhanced Open (Opportunistic Wireless Encryption)
                                                                        1. Open Network Encryption
                                                                          1. Individual Data Protection
                                                                          2. Protected Management Frames (PMF)
                                                                            1. Management Frame Protection
                                                                              1. Mandatory Implementation
                                                                              2. WPA3 Improvements
                                                                                1. Stronger Encryption
                                                                                  1. Better Password Security
                                                                                    1. Simplified Configuration
                                                                                  2. Authentication Methods
                                                                                    1. Pre-Shared Key (PSK) / Personal Mode
                                                                                      1. Passphrase Configuration
                                                                                        1. Key Derivation
                                                                                          1. Use Cases and Limitations
                                                                                          2. Extensible Authentication Protocol (EAP) / Enterprise Mode
                                                                                            1. EAP Framework
                                                                                              1. EAP Methods
                                                                                                1. EAP-TLS
                                                                                                  1. EAP-TTLS
                                                                                                    1. EAP-PEAP
                                                                                                      1. EAP-FAST
                                                                                                      2. Certificate-Based Authentication
                                                                                                        1. Username/Password Authentication
                                                                                                        2. 802.1X Port-Based Network Access Control
                                                                                                          1. Supplicant Role
                                                                                                            1. Authenticator Role
                                                                                                              1. Authentication Server Role
                                                                                                                1. Authentication Process Flow
                                                                                                                2. RADIUS Server
                                                                                                                  1. Authentication, Authorization, Accounting
                                                                                                                    1. RADIUS Attributes
                                                                                                                      1. Role in Enterprise Authentication