scispace - formally typeset
Open AccessJournal ArticleDOI

Penetration Testing of IEEE 802.11 Encryption Protocols using Kali Linux Hacking Tools

Michael Kyei Kissi, +1 more
- 18 Jun 2020 - 
- Vol. 176, Iss: 32, pp 26-33
Reads0
Chats0
TLDR
In this article, the authors use penetration testing to assess vulnerabilities and conduct attacks on Wireless Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (Wi-Fi2) security protocols.
Abstract
The use of wireless network as a medium of communication has tremendously increased due to its flexibility, mobility and easy accessibility. Its usage is inevitable at hotels and restaurants, airports, organizations and currently predominant in homes. As large number of devices connect to wireless network, valuable and sensitive information are shared among users in the open air, attackers can easily sniff and capture data packets. This paper aims at using penetration testing to assess vulnerabilities and conduct attacks on Wireless Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (WPA2) security protocols. The penetration testing was conducted using Kali Linux with its Aircrack-ng tools.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Exploring Wi-Fi WPA2 KRACK Vulnerability: A Review Paper

TL;DR: In this article , the authors investigate the vulnerability of the WPA2 protocol against key reinstallation attaCK (KRACK) attacks and make recommendations for the most effective measures that may be taken to defend against such attacks.
Journal ArticleDOI

Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools

TL;DR: This paper aims at using penetration testing to conduct security assessment of some IEEE 802.1x Port-Based Authentication protocols (PEAP, EAP-TTLS and Inner Authentication Method MSCHAPv2 and PAP).
Journal ArticleDOI

Wireless Networks Encryption by Simulation of Attacks

TL;DR: Many of the security concerns and vulnerabilities associated with the IEEE 802.11 Wireless LAN encryption standard are examined, as well as typical cyber threats and attacks affecting wireless LAN systems in homes and organizations, and general perception of weaknesses for home and business users are provided.
Posted ContentDOI

Examining Wireless Networks Encryption by Simulation of Attacks

Iyas Alodat
TL;DR: Many of the security concerns and vulnerabilities associated with the IEEE 802.11 Wireless LAN encryption standard are examined, as well as typical cyber threats and attacks affecting wireless LAN systems in homes and organizations, and general guidance and suggestions for home and business users are provided.
Proceedings ArticleDOI

Exploring Wi-Fi WPA2 KRACK Vulnerability: A Review Paper

TL;DR: In this paper , the authors investigate the vulnerability of the WPA2 protocol against key reinstallation attaCK (KRACK) attacks and make recommendations for the most effective measures that may be taken to defend against such attacks.
References
More filters
Book ChapterDOI

Weaknesses in the Key Scheduling Algorithm of RC4

TL;DR: It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
ReportDOI

Technical Guide to Information Security Testing and Assessment

TL;DR: This Special Publication 800-series reports on ITL's research, guidance, and outreach efforts in computer security and its collaborative activities with industry, government, and academic organizations.
Proceedings ArticleDOI

Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2

TL;DR: The key reinstallation attack abuses design or implementation flaws in cryptographic protocols to reinstall an already-in-use key, and forces the client into using a predictable all-zero encryption key.
Book

Security+ Guide to Network Security Fundamentals

Mark Ciampa
TL;DR: Cutting-edge coverage of the new edition includes virtualization, mobile devices, and other trends, as well as new topics such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security.
Journal ArticleDOI

Editorial: wireless network security

TL;DR: Topics covered in this book include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications/multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
Related Papers (5)
Trending Questions (1)
How does standardization and consistency in penetration testing with Kali Linux affect the accuracy and reliability of results?

Standardization and consistency in penetration testing with Kali Linux enhance accuracy and reliability by systematically assessing vulnerabilities in IEEE 802.11 encryption protocols like WEP, WPA, and WPA2.