CWNA Summary Notes: Legacy 802.11 Security | MAC Filters

MAC Filtering MAC Filtering referes to the use of MAC addresses to client devices that can authenticate to a WLAN. MAC Filtering is not defined by 802.11 Standard and any implementation of it is Vendor specific. Here is an example from my ASUS home router. Weakness: MAC addresses can easily be spoofed. Where used: Protect … Continue reading CWNA Summary Notes: Legacy 802.11 Security | MAC Filters

CWNA Summary Notes: Legacy 802.11 Security | Static WEP Encryption

Static WEP Encryption This is a layer 2 encryption method using RC4 streaming cipher. Main goals of WEP Encryption were: Confidentiality (Data privacy through encryption) Access Control ( Authorization if static WEP keys match) Data Integrity ( Data Integrity Check-sum is computed before encryption to ensure that the data has not been tampered with) Can … Continue reading CWNA Summary Notes: Legacy 802.11 Security | Static WEP Encryption

CWNA Summary Notes: Legacy 802.11 Security | Legacy Authentication

Legacy Authentication Legacy authentication methods were more of an authentication of capability (verification between two devices that they were valid 802.11 devices) and not so much an authentication of user identity. They are of two types: Open System Authentication It provides authentication without performing any form of user verification Involved a 2 way exchange between … Continue reading CWNA Summary Notes: Legacy 802.11 Security | Legacy Authentication