Zusammenfassung der Ressource
Net Sec U8 -
Wireless
Networking
- Wireless LANs
- vulnerabilities
- anyone can
receive
- anyone can
transmit
- 802.11
- standards
- Infrastructure
mode
- BSS
- SSID
- ESS
- Ad-hoc mode
- IBSS
- physical layer
- DSSS
- data link layer
- LLC
- MAC
- CSMA/CA
- 'hidden nodes
- security issues
- Access Point
Roaming
- Interception
- War-driving
- AP Config
- Evil Twin APs
- Rogue APs or
Ad-hoc networks
- Denial of
Service
- Hub
Broadcasts
- SKA
- WEP
- 802.11b
- weaknesses
- Initialisation vector
- WEP keys
- weak
- Brute
forcing
- beyond
- 802.1x
- 802.11i
- Safeguards
- untrusted
LAN
- Sec. policy &
architecture
- discover
unauthorised
use
- AP Audits
- station protection
- AP Locations
- MAC
address
locking
- Bluetooth
- Piconets &
Scatternets
- Architecture
- connection
states
- active
- sniff
- hold
- park
- security modes
- non-secure
- service level
enforced
- link level enforced
- link layer
services
- authentication
of peer devices
- confidentiality
for transmitted
data
- initialisation
link key
- unit link
key
- combination &
master link key
- vulnerabilities
- PINs
- entry
impractical
- length
- unit key reuse
- unique
addreses
- Denial of
Srv.
- MitM
attacks
- only device
authenticated
- safeguards
- Max PIN lengths
- Policy
- end-to-end
security