Which of the following is an weak implementation of EAP A EA
Which of the following is an weak implementation of EAP?
A. EAP-FAST
B. LEAP
C. PEAP
D. EAP-TLS
Solution
ans.B
------------------------------------------------------------------------------------------------------------------------------------------------------
-->LEAP offers mutual autherntication instead of a one-way authentication between supplicant and AS.
 -->This elimintates the MITM attacks by rogue APs.
 -->IT is vulnerable to dictionary attacks,because it mainly relies on MS-CHAPv2.
 -->Theoretically LEAP is secure if complex enough passwords
 are used .
 -->By complex enough, we mean it is computationally infeasible to attempt an offline dictionary or
 brute force attck.
 -->An attacker now can crack the majority of enterprise WLAN that running LEAP ina few minutes without
 any detection since the attack is passive and offline.
 --> dictionary attack to LEAP is likely to occur, theimpact is high, and the risk is critical. Considering this risk, Cisco recommends users
 move to other EAP methods, such as EAP-FAST, EAP-TLS or EAP-PEAP, to mitigate
 the dictionary attack

