O'Reilly logo

How Secure Is Your Wireless Network? Safeguarding Your Wi-Fi LAN by CCNA Lee Barken - CISSP MCP, CPA

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication Spoofing

A variation of the packet injection attack is authentication spoofing. In order to understand how this attack works, let's take another look at the shared key authentication process.

  • Step 1— The client sends an authentication request to the AP.
  • Step 2— The AP sends the client 128 bytes of challenge text.
  • Step 3— The client encrypts the challenge text with its WEP key and sends the challenge response back to the AP.
  • Step 4— The AP uses its knowledge of the WEP key to validate the challenge response and determine if the client does, in fact, know the shared secret key.
  • Step 5— The AP responds to the client with a success or failure message.

The problem here is that if an attacker can observe this negotiation process, she ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required