Wireless Network Fundamentals and Standards
Wireless networks operate on standards defined by the IEEE 802.11 family of protocols. Understanding these standards provides the foundation for all wireless security study.
Early Standards and Evolution
The original 802.11 standard introduced wireless Local Area Networks (WLANs) but lacked robust security. Later versions added improvements: 802.11b (1999) increased bandwidth, 802.11g (2003) improved data rates, and modern standards like 802.11n (2009), 802.11ac (2013), and 802.11ax (2021) offer enhanced features and stronger security.
Frequency Bands and Coverage
Wireless networks operate on 2.4 GHz or 5 GHz frequency bands. The 2.4 GHz band offers better range but experiences more interference. The 5 GHz band provides higher speeds with shorter range. Newer standards support both frequencies simultaneously.
Network Components
Three key components make up wireless networks:
- Access Points (APs) serve as central nodes managing client connections, handling authentication and encryption
- Basic Service Sets (BSSs) represent the coverage area of a single AP
- Extended Service Sets (ESSs) combine multiple BSSs for larger coverage areas
Identifying Networks
Service Set Identifiers (SSIDs) are broadcast as beacons to advertise network availability. For CEH exam success, you must recognize which standards support which security protocols and understand the technical limitations of each generation.
Encryption Protocols: WEP, WPA, WPA2, and WPA3
Encryption forms the cornerstone of wireless security. The CEH exam heavily emphasizes different encryption standards and their vulnerabilities.
WEP: The Broken Original
Wired Equivalent Privacy (WEP) was the original wireless security protocol but is fundamentally broken. It uses the RC4 stream cipher with short initialization vectors (IVs). WEP supports only 40-bit or 104-bit keys, and its IV reuse vulnerability allows attackers to recover encryption keys through statistical analysis. The FCC deprecated WEP in 2004, and it is completely insecure for modern networks.
WPA: The Interim Solution
Wi-Fi Protected Access (WPA) addressed WEP's weaknesses by implementing Temporal Key Integrity Protocol (TKIP). TKIP changes encryption keys dynamically and adds message integrity checks, improving security significantly. However, TKIP has known vulnerabilities, particularly in the MIC (Message Integrity Check) mechanism.
WPA2: The Standard
WPA2, ratified in 2004, replaced TKIP with Advanced Encryption Standard (AES) in Counter Mode with CBC-MAC (CCMP). AES-CCMP is substantially more secure and remains the security standard for most modern networks. WPA2 supports both Personal and Enterprise modes, with Enterprise using 802.1X authentication and RADIUS servers for centralized access control.
WPA3: The Modern Standard
WPA3, released in 2018, introduces Simultaneous Authentication of Equals (SAE) to replace Pre-Shared Key (PSK) exchange. This eliminates dictionary attack vulnerabilities even with weak passwords. WPA3 also introduces:
- Opportunistic Wireless Encryption (OWE) for open networks
- Individualized Data Protection (iDP) for multi-user networks
For CEH exam success, understand each protocol's encryption mechanisms, key differences, known vulnerabilities, and appropriate use cases.
Authentication Methods and Common Vulnerabilities
Wireless authentication determines who can access the network and involves multiple protocols and mechanisms.
Authentication Types
Open authentication allows any client to connect without credentials but provides no access control. Shared Key authentication uses a pre-shared key for mutual authentication but is vulnerable to man-in-the-middle attacks.
Pre-Shared Key (PSK) authentication, used in WPA/WPA2 Personal mode, requires all users to know the same password. This makes it unsuitable for enterprise environments where individual accountability is necessary.
Enterprise Authentication
Enterprise authentication uses the 802.1X framework with Extensible Authentication Protocol (EAP). This supports various authentication methods:
- EAP-TLS provides certificate-based authentication requiring both client and server certificates for strong mutual authentication
- PEAP (Protected EAP) tunnels authentication within a TLS tunnel, typically using MS-CHAPv2 for password authentication
- EAP-TTLS offers similar functionality with different protocol mechanics
Common Authentication Vulnerabilities
Several vulnerabilities plague wireless authentication:
- Weak password selection in PSK mode
- Misconfigured RADIUS servers in Enterprise mode
- Certificate validation bypasses
- Evil twin attacks set up rogue APs mimicking legitimate networks to capture credentials and traffic
- WPS (Wi-Fi Protected Setup) vulnerability allows attackers to brute-force PIN codes
- Downgrade attacks trick clients into using weaker protocols like WEP or TKIP
- Dictionary attacks crack weak passwords through offline brute-forcing
Understanding these vulnerabilities prepares you to identify security weaknesses and recommend appropriate remediation strategies.
Wireless Attack Vectors and Penetration Testing Tools
The CEH wireless security domain requires practical knowledge of attack methodologies and tools for assessing network security.
Reconnaissance Attacks
Passive reconnaissance involves capturing wireless traffic without connecting to networks. You gather information about available networks, signal strengths, and client activity. Tools like Wireshark and tcpdump capture packets for analysis, while Kismet performs active network detection.
Active reconnaissance involves probing networks directly to trigger responses from APs and clients. Deauthentication attacks disconnect clients by sending spoofed 802.11 deauth frames, capturing the subsequent re-authentication handshakes containing encrypted credentials.
Key Tools for CEH Study
Master these essential tools:
- Aircrack-ng suite includes airmon-ng for monitor mode, airodump-ng for packet capture, and aircrack-ng for WEP/WPA key cracking
- Hashcat performs GPU-accelerated dictionary attacks against captured handshakes
- Reaver targets WPS attacks
- Bully performs WPS brute-forcing
- Pixiewps exploits WPS pixie dust vulnerabilities
Advanced Attack Vectors
Understand these attack methods:
- Evil twin and rogue AP attacks create fake networks mimicking legitimate ones
- Packet sniffing on unencrypted networks reveals sensitive data transmitted in plaintext
- Man-in-the-middle attacks position attackers between clients and APs
- SSL stripping attacks downgrade HTTPS to HTTP, capturing credentials
- Jamming attacks overwhelm wireless frequencies, causing denial of service
- Channel hopping helps attackers find less-congested frequencies
- Power analysis identifies AP locations based on signal strength
Understanding these attack vectors and tools enables you to conduct authorized security assessments and recommend defensive measures.
Defensive Measures and Best Practices for Wireless Security
Protecting wireless networks requires implementing multiple layers of security controls addressing technical, administrative, and physical aspects.
Encryption and Standards
Encryption is fundamental. Require WPA2-AES or WPA3 for all networks, with strong passphrases for personal networks and certificate-based authentication for enterprise deployments. Disable legacy standards like WEP, WPA with TKIP, and older 802.11 protocols to prevent downgrade attacks.
Access Point Security
Change default credentials on all APs and network equipment immediately. Implement strong administrative passwords and disable default accounts. Disable WPS entirely, as its PIN-based mechanism is fundamentally broken despite patches.
Enterprise Authentication
Implement 802.1X authentication in enterprise environments using RADIUS servers with proper certificate validation and secure EAP methods like EAP-TLS. Enable MAC address filtering to restrict network access to authorized devices, though this provides limited security against spoofing.
Traffic and Access Control
Disable SSID broadcast to add minimal obscurity (determined attackers easily discover networks). Use VPNs for sensitive traffic, ensuring encryption even over potentially compromised networks. Implement intrusion detection systems (IDS) and intrusion prevention systems (IPS) to monitor wireless traffic for suspicious activity.
Ongoing Operations
Conduct these activities regularly:
- Update AP firmware to patch known security vulnerabilities
- Segment wireless networks from critical systems using VLANs and firewalls
- Disable remote management access to APs, allowing administration only locally
- Implement strong access control lists limiting client access
- Monitor network traffic for unauthorized devices and suspicious patterns
- Educate users about wireless security risks and phishing attacks
- Position APs strategically to minimize signal leakage beyond facility boundaries
