You are viewing a free preview of this lesson.
Subscribe to unlock all 10 lessons in this course and every other course on LearningBro.
Wireless networks introduce unique security challenges because the transmission medium — radio waves — cannot be physically contained. Anyone within range can potentially intercept traffic, attempt to connect, or launch attacks. Securing wireless networks requires a combination of strong encryption, authentication, and monitoring.
The evolution of Wi-Fi security has been driven by the repeated breaking of older protocols:
| Standard | Encryption | Key Management | Status |
|---|---|---|---|
| WEP | RC4 (40/104-bit) | Static keys | Broken — crackable in minutes |
| WPA | TKIP (RC4-based) | Dynamic keys per packet | Deprecated — vulnerable to attacks |
| WPA2 | AES-CCMP | 4-way handshake (PSK or Enterprise) | Current standard — secure when configured properly |
| WPA3 | AES-GCMP-256 | SAE (Simultaneous Authentication of Equals) | Latest standard — strongest protection |
WEP uses a 24-bit Initialisation Vector (IV) that repeats frequently. Tools like aircrack-ng can crack WEP keys by collecting enough packets — often in under five minutes.
| Feature | WPA2 | WPA3 |
|---|---|---|
| Key exchange | PSK (vulnerable to offline dictionary attacks) | SAE (resistant to offline attacks) |
| Forward secrecy | No | Yes — each session uses unique keys |
| Open network protection | None | OWE (Opportunistic Wireless Encryption) |
| Brute force protection | No | Yes — blocks after repeated failures |
Client (Supplicant)
│
▼
Access Point (Authenticator)
│
▼
RADIUS Server (Authentication Server)
│
▼
Credentials verified → Session key issued → Access granted
| Attack | Description | Mitigation |
|---|---|---|
| Evil Twin | Attacker creates a rogue AP mimicking a legitimate network | 802.1X, wireless IDS, user training |
| Deauthentication Attack | Sending forged deauth frames to disconnect clients | 802.11w (Management Frame Protection), WPA3 |
| WPA2 Handshake Capture | Capturing the 4-way handshake for offline cracking | Strong passphrases (20+ characters), WPA3 SAE |
| KRACK (Key Reinstallation Attack) | Exploiting WPA2 handshake to decrypt traffic | Patch clients and APs, use WPA3 |
| Karma / MANA Attack | Rogue AP responds to any probe request | Disable auto-connect, use 802.1X |
| Rogue Access Point | Unauthorised AP connected to the corporate network | Wireless IDS, NAC, regular scanning |
| Packet Sniffing | Capturing unencrypted wireless traffic | Encryption (WPA2/WPA3), VPN |
Subscribe to continue reading
Get full access to this lesson and all 10 lessons in this course.