WLAN Security Concerns Like other wireless technologies, WL

Tüm saatler GMT +3 Saat


Full versiyon Görüntüle

YAZAR: hcozalp
Tarih: 14/11/2013, 13:04



Media Access Control (MAC) address for the STA. A MAC address is a (hopefully) unique
48-bit value that is permanently assigned to a particular wireless network interface. Many
implementations of IEEE 802.11 allow administrators to specify a list of authorized MAC
addresses; the AP will permit devices with those MAC addresses only to use the WLAN. This is
known as MAC address filtering. However, since the MAC address is not encrypted, it is simple
to intercept traffic and identify MAC addresses that are allowed past the MAC filter.
Unfortunately, almost all WLAN adapters allow applications to set the MAC address, so it is
relatively trivial to spoof a MAC address, meaning attackers can gain unauthorized access easily.
Additionally, the AP is not authenticated to the STA by open system authentication. Therefore, the STA
has to trust that it is communicating to the real AP and not an impostor AP that is using the same SSID.
Therefore, open system authentication does not provide reasonable assurance of any identities, and can be
misused easily to gain unauthorized access to a WLAN or trick users into connecting to a malicious
WLAN.
Shared key authentication was supposed to be more robust than open system authentication; in fact, it is
equally insecure. As the name implies, shared key authentication is based on a secret cryptographic key
known as a Wired Equivalent Privacy (WEP) key; this key is shared by legitimate STAs and APs. (WEP
is described in more detail in Section 3.2.2.) Shared key authentication uses a simple challenge-response
scheme based on whether the STA seeking WLAN acce



-> Cisco ,MCSE ..vb Ağ Yönetimi/Sistem Yönetimi ve Mühendisliği -> PDA Görünüm - Ana Sayfa
Tüm saatler GMT +3 Saat


Full versiyon Görüntüle



Phpbb PDA Görünüm
Muhendisiz.net Tarafindan Yazilmistir.
Writed by muhendisiz.net © 2004 - 2007 All rights reserved.