The methods of protection and hacking of modern WI-FI networks

dc.citation.epage6
dc.citation.issue1
dc.citation.spage1
dc.citation.volume4
dc.contributor.affiliationLviv Polytechnic National University
dc.contributor.authorBoretskyy, Taras
dc.coverage.placenameЛьвів
dc.date.accessioned2020-02-18T08:58:33Z
dc.date.available2020-02-18T08:58:33Z
dc.date.created2019-02-26
dc.date.issued2019-02-26
dc.description.abstractIn this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection.
dc.format.extent1-6
dc.format.pages6
dc.identifier.citationBoretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.
dc.identifier.citationenBoretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/45644
dc.language.isoen
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofAdvances in Cyber-Physical Systems : scientific journal, 1 (4), 2019
dc.relation.references1. S. Fluhrer, I. Mantin, and A. Shamir. “Weaknesses in the key scheduling algorithm of RC4”, International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.
dc.relation.references2. M. Vanhoef and E. Ronen. “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”, p. 1–16.
dc.relation.references3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].
dc.relation.references4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.
dc.relation.references5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]
dc.relation.references6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.
dc.relation.references7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].
dc.relation.references8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].
dc.relation.referencesen1. S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.
dc.relation.referencesen2. M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1–16.
dc.relation.referencesen3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].
dc.relation.referencesen4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.
dc.relation.referencesen5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]
dc.relation.referencesen6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.
dc.relation.referencesen7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].
dc.relation.referencesen8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].
dc.relation.urihttp://www.aircrack-ng.org/
dc.relation.urihttp://csrc.nist.gov/
dc.relation.urihttp://www.haveibeenpwned.com/
dc.relation.urihttp://www.3wifi.stascorp.com/
dc.rights.holder© Національний університет “Львівська політехніка”, 2019
dc.rights.holder© Boretskyi T., 2019
dc.subjectWi-Fi security
dc.subjectWPA2-PSK
dc.subjectdictionary attack
dc.subjecthacking
dc.subject4-way handshake
dc.subjectPBKDF2 authentication protocol
dc.titleThe methods of protection and hacking of modern WI-FI networks
dc.typeArticle

Files

Original bundle

Now showing 1 - 2 of 2
Thumbnail Image
Name:
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6.pdf
Size:
178.3 KB
Format:
Adobe Portable Document Format
Thumbnail Image
Name:
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6__COVER.png
Size:
1.02 MB
Format:
Portable Network Graphics

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
2.94 KB
Format:
Plain Text
Description: