CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition by Matt Walker
Author:Matt Walker [Matt Walker]
Language: eng
Format: epub
Publisher: McGraw-Hill
Published: 2021-11-04T16:00:00+00:00
Figure 7-1 Wireless antennas
NOTE A Yagi antenna is merely a type of directional antenna. However, its name is used for certain directional antennas similar to how âCokeâ is used a lot in the South to indicate soda in general.
Other antennas you can use are dipole and parabolic grid. Dipole antennas have two signal âtowersâ and work omnidirectionally. Parabolic grid antennas are one type of directional antenna and work a lot like satellite dishes. They can have phenomenal range (up to 10 miles due to their power output) but arenât in use much. Another directional antenna type is the loop antenna, which looks like a circle.
So, youâve installed a wireless access point and created a network for clients to connect to. To identify this network to clients who may be interested in joining, youâll need to assign a service set identifier (SSID). The SSID is not a password and provides no security at all for your network. It is simply a text word (32 characters or less) that identifies your wireless network. SSIDs are broadcast by default and are easily obtainable even if you try to turn off the broadcast (in an effort dubbed âSSID cloakingâ). The SSID is part of the header on every packet, so its discovery by a determined attacker is a given, and securing it is virtually a moot point.
EXAM TIP If you see a question on wireless security, you can ignore any answer with SSID in it. Remember that SSIDs do nothing for security, other than identify which network youâre on. Encryption standards, such as WEP and WPA, and physical concerns, such as the placement of APs and antennas used, are your security features.
Once the AP is up and a client comes wandering by, itâs time to authenticate so an IP address can be pulled. Wireless authentication can happen in more than a few ways, from simple to complicated, but for study purposes there are three main methods you should look at: Open System Authentication, Shared Key Authentication, and Centralized Authentication (for example, RADIUS). In Open System Authentication, a client can simply send an 802.11 authentication frame with the appropriate SSID to an AP and have it answer with a verification frame. In Shared Key Authentication, the client participates in a challenge/request scenario, with the AP verifying a decrypted âkeyâ for authentication. Both methods serve the purpose of proving you belong to the network and are illustrated in Figure 7-2.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(25498)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(18217)
Shot Through the Heart by Mercy Celeste(18159)
The Fifty Shades Trilogy & Grey by E L James(17773)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(13187)
The Subtle Art of Not Giving a F*ck by Mark Manson(12903)
Scorched Earth by Nick Kyme(11830)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(11034)
Drei Generationen auf dem Jakobsweg by Stein Pia(10215)
Suna by Ziefle Pia(10185)
Scythe by Neal Shusterman(9256)
International Relations from the Global South; Worlds of Difference; First Edition by Arlene B. Tickner & Karen Smith(8607)
Successful Proposal Strategies for Small Businesses: Using Knowledge Management ot Win Govenment, Private Sector, and International Contracts 3rd Edition by Robert Frey(8416)
This is Going to Hurt by Adam Kay(7692)
Dirty Filthy Fix: A Fixed Trilogy Novella by Laurelin Paige(6450)
He Loves Me...KNOT by RC Boldt(5804)
How to Make Love to a Negro Without Getting Tired by Dany LaFerrière(5375)
Interdimensional Brothel by F4U(5302)
Thankful For Her by Alexa Riley(5158)