CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker
Author:Matt Walker
Language: eng
Format: epub, mobi
Publisher: McGraw-Hill Education
Published: 2022-09-15T00:00:00+00:00
Figure 7-1 Wireless antennas
NOTE A Yagi antenna is merely a type of directional antenna. However, its name is used for certain directional antennas similar to how âCokeâ is used a lot in the South to indicate soda in general.
Other antennas you can use are dipole and parabolic grid. Dipole antennas have two signal âtowersâ and work omnidirectionally. Parabolic grid antennas are one type of directional antenna and work a lot like satellite dishes. They can have phenomenal range (up to 10 miles due to their power output) but arenât in use much. Another directional antenna type is the loop antenna, which looks like a circle.
So, youâve installed a wireless access point and created a network for clients to connect to. To identify this network to clients who may be interested in joining, youâll need to assign a service set identifier (SSID). The SSID is not a password and provides no security at all for your network. It is simply a text word (32 characters or less) that identifies your wireless network. SSIDs are broadcast by default and are easily obtainable even if you try to turn off the broadcast (in an effort dubbed âSSID cloakingâ). The SSID is part of the header on every packet, so its discovery by a determined attacker is a given, and securing it is virtually a moot point.
EXAM TIP If you see a question on wireless security, you can ignore any answer with SSID in it. Remember that SSIDs do nothing for security, other than identify which network youâre on. Encryption standards, such as WEP and WPA, and physical concerns, such as the placement of APs and antennas used, are your security features.
Once the AP is up and a client comes wandering by, itâs time to authenticate so an IP address can be pulled. Wireless authentication can happen in more than a few ways, from simple to complicated, but for study purposes there are three main methods you should look at: Open System Authentication, Shared Key Authentication, and Centralized Authentication (for example, RADIUS). In Open System Authentication, a client can simply send an 802.11 authentication frame with the appropriate SSID to an AP and have it answer with a verification frame. In Shared Key Authentication, the client participates in a challenge/request scenario, with the AP verifying a decrypted âkeyâ for authentication. Both methods serve the purpose of proving you belong to the network and are illustrated in Figure 7-2.
Download
CEH Certified Ethical Hacker All-in-One Exam Guide by Matt Walker.mobi
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Harry Potter and the Goblet Of Fire by J.K. Rowling(3023)
Never by Ken Follett(2869)
Shadow of Night by Deborah Harkness(2709)
Ogilvy on Advertising by David Ogilvy(2677)
Zero to IPO: Over $1 Trillion of Actionable Advice from the World's Most Successful Entrepreneurs by Frederic Kerrest(2373)
The Man Who Died Twice by Richard Osman(2289)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(2263)
Book of Life by Deborah Harkness(2258)
How Proust Can Change Your Life by Alain De Botton(2255)
My Brilliant Friend by Elena Ferrante(2217)
0041152001443424520 .pdf by Unknown(2213)
The Tipping Point by Malcolm Gladwell(2198)
How to Pay Zero Taxes, 2018 by Jeff A. Schnepper(2094)
Will by Will Smith(2032)
Purple Hibiscus by Chimamanda Ngozi Adichie(1977)
Hooked: A Dark, Contemporary Romance (Never After Series) by Emily McIntire(1932)
Borders by unknow(1779)
Rationality by Steven Pinker(1759)
Daughter of Smoke and Bone by Laini Taylor(1737)