Penetration Testing of IEEE 802.11 Encryption Protocols using Kali Linux Hacking Tools
Reads0
Chats0
TLDR
In this article, the authors use penetration testing to assess vulnerabilities and conduct attacks on Wireless Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (Wi-Fi2) security protocols.Abstract:
The use of wireless network as a medium of communication has tremendously increased due to its flexibility, mobility and easy accessibility. Its usage is inevitable at hotels and restaurants, airports, organizations and currently predominant in homes. As large number of devices connect to wireless network, valuable and sensitive information are shared among users in the open air, attackers can easily sniff and capture data packets. This paper aims at using penetration testing to assess vulnerabilities and conduct attacks on Wireless Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2) security protocols. The penetration testing was conducted using Kali Linux with its Aircrack-ng tools.read more
Citations
More filters
Proceedings ArticleDOI
Exploring Wi-Fi WPA2 KRACK Vulnerability: A Review Paper
Mohamed Alhamry,Wael Elmedany +1 more
TL;DR: In this article , the authors investigate the vulnerability of the WPA2 protocol against key reinstallation attaCK (KRACK) attacks and make recommendations for the most effective measures that may be taken to defend against such attacks.
Journal ArticleDOI
Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools
TL;DR: This paper aims at using penetration testing to conduct security assessment of some IEEE 802.1x Port-Based Authentication protocols (PEAP, EAP-TTLS and Inner Authentication Method MSCHAPv2 and PAP).
Journal ArticleDOI
Wireless Networks Encryption by Simulation of Attacks
TL;DR: Many of the security concerns and vulnerabilities associated with the IEEE 802.11 Wireless LAN encryption standard are examined, as well as typical cyber threats and attacks affecting wireless LAN systems in homes and organizations, and general perception of weaknesses for home and business users are provided.
Posted ContentDOI
Examining Wireless Networks Encryption by Simulation of Attacks
TL;DR: Many of the security concerns and vulnerabilities associated with the IEEE 802.11 Wireless LAN encryption standard are examined, as well as typical cyber threats and attacks affecting wireless LAN systems in homes and organizations, and general guidance and suggestions for home and business users are provided.
Proceedings ArticleDOI
Exploring Wi-Fi WPA2 KRACK Vulnerability: A Review Paper
TL;DR: In this paper , the authors investigate the vulnerability of the WPA2 protocol against key reinstallation attaCK (KRACK) attacks and make recommendations for the most effective measures that may be taken to defend against such attacks.
References
More filters
Book ChapterDOI
Weaknesses in the Key Scheduling Algorithm of RC4
TL;DR: It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
ReportDOI
Technical Guide to Information Security Testing and Assessment
TL;DR: This Special Publication 800-series reports on ITL's research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.
Proceedings ArticleDOI
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
Mathy Vanhoef,Frank Piessens +1 more
TL;DR: The key reinstallation attack abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key, and forces the client into using a predictable all-zero encryption key.
Book
Security+ Guide to Network Security Fundamentals
TL;DR: Cutting-edge coverage of the new edition includes virtualization, mobile devices, and other trends, as well as new topics such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security.
Journal ArticleDOI
Editorial: wireless network security
TL;DR: Topics covered in this book include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications/multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.