scispace - formally typeset
Proceedings ArticleDOI

Wireless hacking - a WiFi hack by cracking WEP

TLDR
A look at common threats, vulnerabilities related with wireless networks, the entire process of cracking WEP (Wired Equivalent Privacy) encryption of WiFi, and the necessity to become familiar with scanning tools to help survey the area and tests to run so as to strengthen the air signals.
Abstract
Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the vehemence in recent times. People are installing these in houses, institutions, offices and hotels etc, without any vain. In search of fulfilling the wireless demands, Wi-Fi product vendors and service contributors are exploding up as quickly as possible. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. With the consumer demand, vendor solutions and industry standards, wireless network technology is factual and is here to stay. But how far this technology is going provide a protected environment in terms of privacy is again an anonymous issue. Realizing the miscellaneous threats and vulnerabilities associated with 802.11-based wireless networks and ethically hacking them to make them more secure is what this paper is all about. On this segment, we'll seize a look at common threats, vulnerabilities related with wireless networks. And also we have discussed the entire process of cracking WEP (Wired Equivalent Privacy) encryption of WiFi, focusing the necessity to become familiar with scanning tools like Cain, NetStumbler, Kismet and MiniStumbler to help survey the area and tests we should run so as to strengthen our air signals.

read more

Citations
More filters
Book ChapterDOI

Privacy and Security Aspects of E-government in Smart Cities

TL;DR: This chapter investigates the current deployment strategies and the technological solutions of e-government in terms of security and privacy in a Smart City environment and proposes a decentralized framework based upon blockchain and artificial intelligence to provide a secure and privacy-preserving infrastructure.
Proceedings ArticleDOI

Rogue Z-Wave controllers: A persistent attack channel

TL;DR: A new vulnerability is introduced that allows the injection of a rogue controller into the network that maintains a stealthy, persistent communication channel with all inadequately defended devices.
Journal Article

Wireless networks: developments, threats and countermeasures

TL;DR: The findings from reviewing these research papers proved that the complexity of the attacks had increased by time and the attacks in WiFi network are passive and more dangerous to the end users.
Journal ArticleDOI

Wireless LAN Security Threats & Vulnerabilities

TL;DR: The various security issues and vulnerabilities related to the IEEE 802.11 Wireless LAN encryption standard and common threats/attacks pertaining to the home and enterprise Wireless LAN system are discussed and overall guidelines and recommendation are provided to theHome users and organizations.
Dissertation

Improving network performance : an evaluation of TCP/UDP on networks

TL;DR: Evaluating the behaviour of TCP and UDP end-to-end on networks in three scenarios, namely, networks with transition mechanisms, wireless based networks, and in the context of using virtual private network technologies as security protocols is evaluated.
References
More filters
Journal ArticleDOI

Securing ad hoc networks

TL;DR: This article takes advantage of the inherent redundancy in ad hoc networks-multiple routes between nodes-to defend routing against denial-of-service attacks and uses replication and new cryptographic schemes to build a highly secure and highly available key management service, which terms the core of this security framework.
Proceedings ArticleDOI

Capacity of Ad Hoc wireless networks

TL;DR: The question “Are large ad hoc networks feasible?” reduces to a question about the likely locality of communication in such networks, and it is shown that for total capacity to scale up with network size the average distance between source and destination nodes must remain small as the network grows.
Proceedings ArticleDOI

Practical attacks against WEP and WPA

TL;DR: In this article, the authors describe two attacks on IEEE 802.11 based wireless LANs: improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key, and dictionary attack when a weak pre-shared key is used.
Journal ArticleDOI

Weaknesses in the temporal key hash of WPA

TL;DR: Given a few RC4 packet keys in WPA it is possible to find the Temporal Key (TK) and the Message Integrity Check (MIC) key and this shows that parts of WPA are weak on their own.
Posted Content

Practical attacks against WEP and WPA.

TL;DR: In this article, the authors describe two attacks on IEEE 802.11 based wireless LANs, one is an improved key recovery attack on WEP, which reduces the average number of packets an attacker has to intercept to recover the secret key.