Should an impostor capture the authenticator on the network and, without decrypting it, sends it as is to the captive gateway, could he or she obtain illegal access to the network?



Should an impostor capture the authenticator on the network and, without decrypting it, sends it as ..

Answer / chaitanya

It is not as simple as it seems. Once the impostor has sniffed the authenticator, before using it he or she must wait for the legitimate client to abandon the network. The IP and MAC addresses would then be changed and made correspond with those of the client who abandoned the network and lastly send the authenticator to the gateway, while waiting for the latter to enable the connection. In fact, the impostor would wait in vain for two reasons: the authenticator has a limited duration over time and most certainly, on use by an impostor, will have already expired; the captive gateway can remember previously used authenticators to enable a connection and won't allow access to a replica

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More WiFi Security Interview Questions

What is the difference between the HostAP drivers and the wlan-ng drivers for Linux?

1 Answers  


Our organization doesn’t have a wireless network, so is it even important for our security engineers to understand wireless security?

1 Answers  


Why should not the user close the popup control window which appears after the authentication with the CaptivePortal?

1 Answers  


What is the difference between active and passive WLAN detection?

1 Answers  


What is the primary difference between 802.11g and 802.11a?

1 Answers  






Captive gateways can work in Routed Mode or in Bridged Mode. What does that mean?

1 Answers  


What tools do you use to WarDrive?

1 Answers  


How many types of Extensible Authentication Protocols (EAPs) are supported by WPA/WPA2 and what are they?

1 Answers  


I have a Wi-Fi network and would like to protect it from unauthorized access. It is better to use a RADIUS server that allows me to have 802.1x authentication and protection with WPA or WPA2 or use a Captive Portal that authenticates access via web login?

1 Answers  


If my wireless network doesn’t have a lot of traffic, is it okay to use WEP because the IVs required to crack the WEP key won’t be generated?

1 Answers  


Briefly describe the process involved in cracking WEP.

1 Answers  


What is the minimum passphrase length that should be used for WPA-PSK?

1 Answers  


Categories