From the course: CompTIA Security+ (SY0-701) Cert Prep

Unlock the full course today

Join today to access over 24,000 courses taught by industry experts.

Wireless attacks

Wireless attacks

- [Instructor] As a security professional, you should understand the different options for wi-fi encryption and how the use of Wired Equivalent Privacy or the WEP protocol is insecure. Let's dig into that a little further and discuss how an attacker might take advantage of a WEP network. When you set up a new WEP connection, the computer and access point exchange and initialization vector, or IV, that helps get the connection established. This IV is sent without encryption because it's used to create the encrypted channel. If an attacker captures enough different initialization vectors, they can reconstruct the encryption key used for web connection. Fortunately, you don't need to know the mathematical details on how this attack works, because they are pretty complicated, but it's important that you know that WEP attacks rely upon capturing initialization vectors as you prepare for the exam. Wi-fi Protected Access like WEP relies on the RC4 encryption standard. If you recall, the…

Contents