Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. 164 Security Essentials Lab Manual 10. The WPA four-way handshake sends messages that generate encryption keys used in the transmission. The actual passphrase or password is not sent instead, it is used in the handshake, which ultimately creates the key value. The access point begins the process by sending an EAPOL authentication message used with IEEE 802.1x configurations. The EAPOL authentication is sent with a random value called a nonce. Open the first EAPOL transaction and locate and screenshot the nonce sent. This information is in the 802.1x Authentication section. Additionally, take notice of the secure key value setting of 0 under the Key Information heading. This is due to encrypted not having been generated. 11. The client’s response to this handshake will include a value called a message integrity check (MIC), which allows an AP to verify if a message was corrupted or modified. Locate the MIC in the second handshake transaction. Create and save a screenshot of the WPA Key MIC value located in this Authentication setting. _ _________________________________________________________________________________________________________________ 12. On the final transaction of the handshake, locate the Key Information value. What is the cipher and hash version used in this transaction? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 13. Once the handshake is successful, data transmissions will be encrypted or protected. Locate a data packet on packet number 114 and screenshot the data payload it contains. 14. Close all programs, and submit your lab to your instructor.