O'Reilly logo

Eleventh Hour Security+ by Ido Dubrawsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Authentication

There are two authentication methods in the 802.11 standard:

Crunch Time

The shared-key authentication process is a four-step process that begins when the AP receives the validated request for association. After the AP receives the request, a series of management frames are transmitted between the stations to produce the authentication. This includes the use of the cryptographic mechanisms employed by WEP as a validation and break down in the following manner:

  1. The requestor (the client) sends a request for association.
  2. The authenticator (the AP) receives the request, and responds by producing a random challenge text and transmitting it back to the requestor.
  3. The requestor receives the transmission, encrypts the challenge ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required