Sandesh Jain, Sarthak Pruthi, Vivek Yadav, K. Sharma
{"title":"Penetration Testing of Wireless EncryptionProtocols","authors":"Sandesh Jain, Sarthak Pruthi, Vivek Yadav, K. Sharma","doi":"10.1109/ICCMC53470.2022.9754042","DOIUrl":null,"url":null,"abstract":"Due to its flexibility, portability, and simplicity of accessibility, the use of wireless networks as a communication medium has skyrocketed. As more devices join a wireless network, valuable and sensitive data is sent over the air between users, making it easy for attackers to sniff and seize data packets. The goal of this work is to use penetration testing to identify weaknesses in the WEP, WPA, and 802.11i WPA2 security protocols, as well as to conduct attacks against them being anonymous with the use of macchanger script. Kali Linux and its Aircrack-ng tools were used to perform penetration testing in WEP & exploited a 4-way handshake for WPA/WPA2.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC53470.2022.9754042","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Due to its flexibility, portability, and simplicity of accessibility, the use of wireless networks as a communication medium has skyrocketed. As more devices join a wireless network, valuable and sensitive data is sent over the air between users, making it easy for attackers to sniff and seize data packets. The goal of this work is to use penetration testing to identify weaknesses in the WEP, WPA, and 802.11i WPA2 security protocols, as well as to conduct attacks against them being anonymous with the use of macchanger script. Kali Linux and its Aircrack-ng tools were used to perform penetration testing in WEP & exploited a 4-way handshake for WPA/WPA2.