IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 8, August 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Advanced Attack Against Wireless Networks Wep, Wpa/Wpa2-Personal And Wpa/Wpa2-Enterprise

[Full Text]

 

AUTHOR(S)

MuthuPavithran. S, Pavithran. S,

 

KEYWORDS

 

ABSTRACT

ABSTRACT: In the emerging world of electronics the wireless devices are used by millions of people in their day to day life. Every person is constantly in contact with the cyberspace. Thus, ensuring the proper encryption facility is a major undertaking to offer dependable communication. The aim of this paper is to transmit a wireless penetration test and compares the encrypted key of a wireless network with a file that contains the captured packets as alphanumeric letters with the help of Kali Linux. This paper shows penetration tests in WEP and WPA/WPA2 protocols, and also the methods to develop these protocols using various attacks and to supply tools that separate the vulnerable access point protocol for the web administrators to protect their networks.

 

REFERENCES

[1] WarrenHarrop, GrenvilleArmitage, Transparent IP Layer Interception on Enterprise 802.11 b/g networks.

[2] Kshitiz Saxena, The Analyses of Wireless Encryption to handshake mechanism in WPA-NITTTR, 2010.

[3] Guzman Santaf’e-An anomaly based Intrusion detection system for IEEE 802.11 networks, S2ISec information security labs, 2006.

[4] LIU Yong-lie, JIN Zhigang, Research on attack to WEP Protocol, Nov-2010.

[5] Popuri Manoj Kumar,Attacks and Mitigations over wireless network networks-Insecure Wireless world,The International Journal of Engineering & Sciences.-2013.

[6] Martin Beck,Practical attacks against WEP & WPA ,Erik Tews TU-Darmstadt-Nov,2008.

[7] Latha.P.H,Vasantha.R-Review of existing security protocols techniques and their performance analysis in WAN-IJETCAS-2014.

[8] Paul S.Henry and Hui Luo,AT&T Labs-Research wifi:what is next? December 2002.

[9] R.N.Rajotiya,PridhiArora,-Enhancing security of wifi network,The International Journal of Computer Application,June 2012.

[10] Paul Arna,Benefits and vulnarabilities of wifi protocol access2 (WPA2)-INFS612-Fall,2006.