802.1X provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority. The specific authentication is left up to the provider
802.11. A set of physical and MAC specifications for implementing WLAN computer communication in the 900 MHz and 2.4, 3.6, 5, and 60 GHz frequency bands
802.11ac. 5 GHz band, more spatial streams (up to eight versus four), higher-order modulation. 433.3 Mbit/s per
Wave 1. Channels up to 80 MHz
Wave 2. Channels up to 160 MHz
a. 5 GHz band with a maximum net data rate of 54 Mbit/s, plus error correction code. OFDM
b. 2.4 GHz band. maximum raw data rate of 11 Mbit/s. uses the same media access method defined in the original standard
g. Same OFDM method as a. 2.4 GHz band. 54 Mbit/s exclusive of forward error correction codes, or about 22 Mbit/s average throughput
n. both the 2.4 GHz and the 5 GHz bands. maximum net data rate from 54 Mbit/s to 600 Mbit/s. multiple-input multiple-output antennas (MIMO)
i. Robust Security Network (RBN) or WPA2 implementing AES-PSK
e. quality of service (QoS) enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer.
p. adds wireless access in vehicular environments (WAVE), a vehicular communication system
r. fast BSS transition (FT), also called "fast roaming." allows for the part of the key derived from the server to be cached in the wireless network, so that future connections can be based on the cached key, avoiding the 802.1X process
w. increases the security of its management frames and offers replay protection (MitM)
Rogue Access Points
This is an access point set up by a hacker to mimic an actual network device. The attacker uses their own machine to intercept traffic
DoS Denial of Service attacks disrupt service by flooding a network device with more requests than it can handle
Volume Based Attacks. Volume based attacks attack the machine with a large amount of requests. This usually exhausts the host’s resources which is when it will drop its service. Normally when a packet is sent, the sender will wait for a response before another request In a flood attack, the sender sends many requests without waiting for a response. This slowly builds up in the server’s memory until it is exhausted or service is significantly slowed.
Protocol attacks exploit known vulnerabilities in the TCP/IP suite of protocols. TCP and IP are two different protocols at separate layers in the OSI model which can be targeted in distinct ways. There are other less-used protocols that also have vulnerabilities but for the sake of brevity will not be discussed. These are performed by mal-formed packets or interrupting the normal flow of the protocol
Application Layer Attacks. HTTP attacks do not utilize mal-formed packets or spoofing that other techniques utilize. Instead GET and POST requests are utilized to target the server. Zero day attacks exploit vulnerabilities for which no patch has yet been applied.