🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

Chapter 11 - 04 - Discuss and Implement Wireless Network Security Measures - 03_ocred.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Selecting a Strong Wireless Encryption Mode Orxder of preference for O A strong wireless encryption mode choosing an encryption mode: should be selected for the wireless network LINKSYS® A Division of Osco Systoms, inc. ' Fumwa...

Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Selecting a Strong Wireless Encryption Mode Orxder of preference for O A strong wireless encryption mode choosing an encryption mode: should be selected for the wireless network LINKSYS® A Division of Osco Systoms, inc. ' Fumware Vervion: v 00.0 Wircloss G Broadband Router Wireless , Seculy Vrolom secujvoe Socurty [Oiabied 1 pniciens Wrokm MAC | 7] Disabled WPA Personal WPA Enterprise WPAZ Enterprize RADIUS WEP R 02 WPA2 Enterprise with RADIUS 03 WPAZ 04 WPA2 PSK 05 WPA Enterprise 06 WPA 02 WEP. Entefpl'lse WRTBAG hGamng Fller 01 CiscoSrarimy Save Setlings m Copyright © by EC-Council All Rights Reserved. Reproduction is Stricly Prohibited. Selecting a Strong Wireless Encryption Mode A strong wireless encryption mode should be used for keeping the wireless network safe from various types of attacks. There are various encryption modes that can be used for an organization’s wireless network. LINKSYS® A Division of Cisco Systems, Inc. Firmware Version: v8.00.0 Wireless-G Broadband Router % Wireless — Setup Wireless Basic Wireless Settings | - Security Wireless Security Access Applications Restrictions | Wi & Gaming MAC Fiter | Wireless Security Security Mode: Disabled Disabled Securnity Mode: You may f.r:'flwglAllE:l:flpW:; : WPA2 Personal, WPA2 l '“’:’:;::D'u S, l n::' Enterprise use the same security mode in order ifo commuricae. WPA2 Enterprise RADIUS WEP Administration Advanced Wireless Settings m v | WPA Personal WPA WRT54G | Cisco SysTems Cancel Changes Figure 11.17: Selecting wireless encryption mode Module 11 Page 1465 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Order of preference for choosing an encryption mode 1. WPA3 WPA2 Enterprise with RADIUS WPA2 Enterprise U WPA Enterprise U WPA2 PSK WPA 7. WEP Order of preference for choosing a Wi-Fi security method e RN 1. WPA3 WPA2 + AES WPA + AES WPA + TKIP/AES WPA + TKIP N WEP Open Network (no security at all) Module 11 Page 1466 Certified Cybersecurity Technician Copyright © by EG-Gotmeil All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Defending Against WPA Cracking Select a complex passphrase which contains a minimum of 20 characters and change the passphrase at regular intervals Use WPA3 /WAP2 encryption only Set the client settings properly (e.g., validate the server, specify the server address, do not prompt for new servers, etc.) Use a virtual private network (VPN) such as a remote access VPN, Extranet VPN, Intranet VPN, etc. Implement a network access control (NAC) or network access protection (NAP) solution for additional control over end-user connectivity R DP00000 Select a random passphrase that is not made up of dictionary words Defending Against WPA Cracking The only way to crack WPA is to sniff the password pairwise master key (PMK) associated with the “handshake” authentication process. If this password is extremely complicated, it might be almost impossible to crack. The following countermeasures can help a user to defeat WPA cracking attempts: Select a random passphrase that is not made up of dictionary words. Select a complex passphrase which contains a minimum of 20 characters and change the passphrase at regular intervals Use WPA3 /WAP2 encryption only Set the client settings properly (e.g., validate the server, specify the server address, do not prompt for new servers, etc.) Use a virtual private network (VPN) such as a remote access VPN, Extranet VPN, Intranet VPN, etc. Implement a network access control (NAC) or network access protection (NAP) solution for additional control over end-user connectivity Do not use words from the dictionary. Do not use words with numbers appended at the end. Do not use double words or simple letter substitution such as p@55wOrd. Do not use common sequences from your keyboard such as qwerty. Do not use common numerical sequences. Avoid using personal information in the key/password. Module 11 Page 1467 Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Exam 212-82 Wireless Network Security A WPA password should be constructed according to the following rules: = |t should have a random passphrase. = |t should have at least 12 characters in length. = |t should contain at least one uppercase letter. = |t should contain at least one lowercase letter. = |t should contain at least one special character such as @ or ! = |t should contain at least one number. Module 11 Page 1468 Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 Detecting Rogue Access Points Wireless Scanning Wired Network Scanning ++» Performs a wireless network scanning to detect the presence of wireless APs in the vicinity % Discovery of an AP not listed in the wireless device inventory indicates the presence of a rogue AP %+ Use network scanners such as Nmap to identify APs on the network. This will help in locating rogue devices on the wired network %+ Use the SNMP to identify the IP devices attached to the wired network «+ Use the SNMP detection utilities such as SolarWinds SNMP scanner, Lansweeper SNMP scanner, etc., to identify the SNMP-enabled devices on the network VA «» Use wireless discovery tools such as inSSlIDer, NetSurveyor, JOR S NetStumbler, Vistumbler, Kismet, etc., to detect wireless networks 0) smg: :mm:mfl Note: To use SNMP polling, the SNMP service on all IP devices in the network should be enabled. Detecting Rogue Access Points A wireless AP is termed as a rogue AP when it is installed on a trusted network without authorization. An inside or outside attacker can install rogue APs on a trusted network for their malicious intent. Types of Rogue APs 1. Wireless router connected via a “trusted” interface 2. Wireless router connected via an “untrusted” interface 3. Installing a wireless card into a device that is already on a trusted LAN 4. Enabling wireless on a device that is already on a trusted LAN The methods mentioned below should be used for detecting wireless networks in the vicinity of the network and the detected wireless APs should be compared with the wireless device inventory for the environment. If an AP that is not listed in the inventory is found, it can generally be considered as a rogue AP. = Wireless scanning: It performs an active wireless network scanning to detect the presence of wireless APs in the vicinity. It helps in detecting unauthorized or hidden wireless APs that can be malicious. Discovery of an AP not listed in the wireless device inventory indicates the presence of a rogue AP. You can use wireless discovery tools such as inSSIDer, NetSurveyor, NetStumbler, Vistumbler, Kismet, etc., to detect wireless networks. * Wired network scanning: identifying a large number Module 11 Page 1469 Wired network scannerssuch of devices on a network as Nmap are used for by sending specially crafted TCP Certified Cybersecurity Technician Copyright © by EG-Council All Rights Reserved. Reproduction is Strictly Prohibited. Certified Cybersecurity Technician Wireless Network Security Exam 212-82 packets to the device (Nmap-TCP fingerprinting). It helps locate rogue APs attached to a wired network. * Simple Network protocol (SNMP) Management Protocol (SNMP) polling is used polling: Simple network management for identifying the IP devices attached to a wired network. SNMP detection utilities such as SolarWinds SNMP Scanner, Lansweeper, etc., can be used for identifying SNMP enabled devices on the network. Note: To use SNMP enabled. Module 11 Page 1470 polling, the SNMP service on all IP devices in the network should be Certified Cybersecurity Technician Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited.

Use Quizgecko on...
Browser
Browser