Which of the following weaknesses exist in WPS-enabled wireless networks?
The correct answer is C) brute force occurs within 11000 combinations.
Brute force occurs within 11000 combinations: WPS (Wi-Fi Protected Setup) has a significant weakness that allows attackers to easily perform a brute-force attack on the 8-digit PIN used during the WPS authentication process. The 8-digit PIN is divided into two 4-digit halves. The first half is used to verify the device, and the second half is used to confirm the PIN. Attackers can brute-force this PIN, and due to the structure of the PIN, there are only 11,000 combinations to try (because the first half of the PIN is checked through a checksum). This makes WPS susceptible to a fast brute-force attack.
Why the others are incorrect:
Utilizes TKIP to secure the authentication handshake: This statement is incorrect because TKIP (Temporal Key Integrity Protocol) is not used to secure the WPS authentication handshake. WPS uses a PIN-based method for authentication and does not rely on TKIP. TKIP is an older encryption protocol used with WPA, but it is not related to WPS weaknesses.
Utilizes a 24-bit IV: This is a weakness related to older wireless encryption protocols, like WEP, which used a 24-bit Initialization Vector (IV). WPS does not inherently have a weakness related to a 24-bit IV. WPS weaknesses are primarily due to its PIN-based authentication process.
Utilizes a 40-bit encryption key: This refers to WEP encryption, which uses a 40-bit encryption key (though the key was extended to 104 bits later). WPS itself doesn't use a 40-bit key for encryption; instead, it uses a PIN for authentication, which is the weakness that makes it vulnerable to brute-force attacks.
No Payment Cards Needed
Discover a range of courses designed to provide you with the knowledge and skills needed to excel in your chosen field.
You don’t need one month to study and pass your test.
With Prepsaret, it takes you a few days to grasp all the concepts needed to pass your exams