Lab 17: Wireless Security
🎯 Objective
Understand WiFi protocol evolution from WEP to WPA3, analyze WPA2 attack vectors conceptually, build a wireless security checklist, and understand 802.1X enterprise authentication.
📚 Background
Wireless networks present unique security challenges compared to wired networks. Unlike wired connections where an attacker needs physical access to a cable or port, wireless signals propagate through walls and can be intercepted by anyone within range. This makes the authentication and encryption protocol critically important — anyone who can receive the radio signal could potentially eavesdrop or attack the network.
The evolution from WEP to WPA3 reflects hard lessons learned from attacks. WEP (1997) was fundamentally broken and could be cracked in minutes using freely available tools. WPA (2003) was an emergency patch. WPA2 (2004) provided strong AES encryption but had implementation vulnerabilities like KRACK (Key Reinstallation Attacks). WPA3 (2018) addressed WPA2's weaknesses with Simultaneous Authentication of Equals (SAE), perfect forward secrecy, and improved protection for open networks.
Enterprise wireless authentication using 802.1X with RADIUS servers provides significantly stronger security than pre-shared keys. With PSK, anyone who knows the password can join the network and potentially eavesdrop on other clients. With 802.1X, each user has individual credentials, enabling per-user access control and audit trails.
⏱️ Estimated Time
35 minutes
📋 Prerequisites
Basic networking concepts
Lab 06: Public Key Cryptography (helpful)
🛠️ Tools Used
python3— protocol analysis and security toolsopenssl— cryptographic concepts
🔬 Lab Instructions
Step 1: WiFi Protocol Evolution
📸 Verified Output:
💡 What this means: 25 years of WiFi security shows a constant arms race between attack and defense. Each protocol was broken, driving development of the next. WPA3's SAE handshake provides perfect forward secrecy — even if the PSK is eventually discovered, past captured traffic remains secure.
Step 2: WEP Weakness Analysis
📸 Verified Output:
💡 What this means: The math makes WEP's failure inevitable. With only 16 million possible IVs and a busy network generating hundreds of packets per second, IV collisions are guaranteed within hours. This is why WEP was deprecated in 2004.
Step 3: WPA2 Attack Vectors
📸 Verified Output:
💡 What this means: WPA2's fundamental weakness in Personal mode is that the PSK is the only trust anchor. Anyone who captures a handshake can mount an offline dictionary attack at billions of guesses per second. The defense: use truly random, long PSKs or switch to WPA3/Enterprise.
Step 4: 802.1X Enterprise Authentication
📸 Verified Output:
💡 What this means: 802.1X eliminates the shared password problem — each user authenticates individually. This enables per-user audit logging, VLAN assignment, and instant access revocation. The certificate validation step is critical — without it, evil twin attacks succeed against 802.1X.
Step 5: Wireless Security Checklist
📸 Verified Output:
💡 What this means: WPS disabled is the single highest-impact quick fix — it eliminates a vulnerability that can be exploited in hours with basic tools. Disabling it takes 30 seconds in the router admin panel.
Step 6: Open Network Security Analysis
📸 Verified Output:
💡 What this means: Certificate validation is your last line of defense against MITM attacks on open networks. "The browser is paranoid" — no, the browser is warning you about a genuine attack. Proceed with extreme caution or stop using that network.
Step 7: WPA2 vs WPA3 SAE Technical Comparison
📸 Verified Output:
💡 What this means: Forward secrecy is the key innovation in WPA3. Even if your password is compromised months later, historical traffic remains secure because each session used unique ephemeral keys that were never stored.
Step 8: Wireless Penetration Testing Overview
📸 Verified Output:
💡 What this means: Active wireless testing (sending deauth frames, attempting connections) without authorization is illegal. Always get written permission. Many jurisdictions prosecute unauthorized wireless access under computer crime laws, even if the network uses a weak password.
✅ Verification
🚨 Common Mistakes
Using WPS: WPS can be cracked in hours with Reaver — disable it immediately
Weak PSK: Short dictionary words are cracked in seconds; use 20+ random characters
Not validating RADIUS certificates: Skipping cert validation on 802.1X exposes you to evil twin RADIUS servers
Same SSID for corp and guest: Use separate SSIDs on separate VLANs with firewall between them
Testing without authorization: Wireless testing without written permission is illegal in most countries
📝 Summary
Protocol evolution: WEP (broken, <1 min crack) → WPA (deprecated) → WPA2 (good with strong PSK) → WPA3 (current gold standard)
WPA2 vulnerabilities: offline dictionary attacks, KRACK, PMKID, WPS brute force — all addressable with strong PSK + WPS disabled + patches
WPA3 SAE provides perfect forward secrecy — even if PSK is compromised, past sessions remain encrypted
802.1X enterprise authentication provides per-user credentials, audit trails, and VLAN assignment vs shared PSK
Open networks are completely unencrypted; WPA3 Enhanced Open (OWE) adds encryption without passwords
🔗 Further Reading
Last updated
