CompTIA PenTest+
1 Threats, Attacks, and Vulnerabilities
1-1 Common Threat Actors
1-2 Threat Intelligence Sources
1-3 Threat Actors and Motives
1-4 Threat Actor Tactics, Techniques, and Procedures (TTPs)
1-5 Vulnerability Types
1-6 Exploit Types
1-7 Attack Types
1-8 Threat Detection and Monitoring
1-9 Threat Hunting
1-10 Incident Response
2 Architecture and Design
2-1 Security Controls
2-2 Network Architecture
2-3 Cloud and Virtualization
2-4 Web Application Security
2-5 Wireless Security
2-6 Mobile Security
2-7 IoT Security
2-8 Industrial Control Systems (ICS) Security
2-9 Physical Security
2-10 Secure Software Development
3 Tools and Code
3-1 Penetration Testing Tools
3-2 Exploitation Tools
3-3 Post-Exploitation Tools
3-4 Reporting Tools
3-5 Scripting and Automation
3-6 Programming Languages
3-7 Code Analysis
3-8 Open Source Intelligence (OSINT) Tools
4 Planning and Scoping
4-1 Penetration Testing Methodologies
4-2 Legal and Compliance Considerations
4-3 Scope Definition
4-4 Risk Assessment
4-5 Threat Modeling
4-6 Information Gathering
4-7 Asset Identification
4-8 Data Classification
4-9 Business Impact Analysis
4-10 Penetration Testing Objectives
5 Information Gathering and Vulnerability Identification
5-1 Passive Reconnaissance
5-2 Active Reconnaissance
5-3 Vulnerability Scanning
5-4 Network Mapping
5-5 Service Identification
5-6 Web Application Scanning
5-7 Wireless Network Scanning
5-8 Social Engineering Techniques
5-9 OSINT Techniques
5-10 Vulnerability Databases
6 Attacks and Exploits
6-1 Exploit Development
6-2 Buffer Overflows
6-3 SQL Injection
6-4 Cross-Site Scripting (XSS)
6-5 Cross-Site Request Forgery (CSRF)
6-6 Command Injection
6-7 Privilege Escalation
6-8 Lateral Movement
6-9 Evasion Techniques
6-10 Exploit Delivery Methods
7 Penetration Testing Process
7-1 Pre-Engagement Activities
7-2 Reconnaissance
7-3 Scanning and Enumeration
7-4 Exploitation
7-5 Post-Exploitation
7-6 Reporting
7-7 Remediation
7-8 Retesting
7-9 Documentation and Evidence Collection
7-10 Communication and Coordination
8 Reporting and Communication
8-1 Report Structure
8-2 Executive Summary
8-3 Technical Findings
8-4 Risk Assessment
8-5 Remediation Recommendations
8-6 Legal and Compliance Considerations
8-7 Presentation Skills
8-8 Communication with Stakeholders
8-9 Documentation Standards
8-10 Continuous Improvement
9 Security and Compliance
9-1 Regulatory Requirements
9-2 Industry Standards
9-3 Compliance Audits
9-4 Data Protection
9-5 Privacy Laws
9-6 Incident Response Planning
9-7 Disaster Recovery Planning
9-8 Business Continuity Planning
9-9 Risk Management
9-10 Security Awareness Training
2.5 Wireless Security

2.5 Wireless Security

Key Concepts

1. Wireless Encryption Protocols

Wireless encryption protocols are methods used to secure data transmitted over wireless networks. The most common protocols include WEP, WPA, WPA2, and WPA3.

Example: WEP (Wired Equivalent Privacy) is an older protocol that uses a 40-bit or 104-bit key to encrypt data. However, it is vulnerable to attacks and is no longer considered secure. WPA2 (Wi-Fi Protected Access II) uses Advanced Encryption Standard (AES) to provide stronger encryption and is widely used today.

2. Authentication Methods

Authentication methods ensure that only authorized users can access a wireless network. Common methods include Pre-Shared Key (PSK), Extensible Authentication Protocol (EAP), and 802.1X.

Example: PSK requires users to enter a shared password to access the network. EAP is more secure and supports various authentication methods, such as EAP-TLS (Transport Layer Security) and EAP-PEAP (Protected EAP), which use digital certificates and secure tunnels.

3. Rogue Access Points

Rogue access points are unauthorized wireless access points set up by attackers to intercept or manipulate network traffic. They can be used to launch man-in-the-middle attacks or gain unauthorized access to a network.

Example: An attacker might set up a rogue access point with the same SSID (Service Set Identifier) as a legitimate network. Unsuspecting users connect to the rogue AP, allowing the attacker to capture their credentials and other sensitive information.

4. Wireless Intrusion Detection Systems (WIDS) and Wireless Intrusion Prevention Systems (WIPS)

WIDS and WIPS are security systems designed to detect and prevent unauthorized access to wireless networks. WIDS monitors network traffic for suspicious activity, while WIPS can take automated actions to block threats.

Example: A WIDS might detect a high number of failed authentication attempts from a single device, indicating a brute-force attack. A WIPS could automatically block the device from accessing the network to prevent further attempts.

5. Wireless Network Segmentation

Wireless network segmentation involves dividing a wireless network into smaller, isolated segments to limit the spread of attacks and protect sensitive data. This can be achieved using VLANs (Virtual LANs) and firewalls.

Example: A company might segment its wireless network into separate VLANs for employees, guests, and IoT devices. This ensures that a breach in the guest network does not compromise the employee network, and IoT devices are isolated from sensitive corporate data.

Analogies and Examples

Consider a secure building as an analogy for a wireless network. The building's locks and security systems represent encryption protocols, ensuring that only authorized individuals can enter. The security guards represent authentication methods, verifying the identities of visitors. The building's alarm system represents WIDS, detecting unauthorized entry attempts. The security team represents WIPS, taking action to prevent breaches. Finally, the building's separate wings represent network segmentation, ensuring that a breach in one area does not compromise the entire building.

By understanding and implementing these wireless security concepts, organizations can protect their networks from unauthorized access and potential threats.