Advanced Attack Against Wireless Networks Wep, Wpa/Wpa2-Personal And Wpa/Wpa2-Enterprise
MuthuPavithran. S, Pavithran. S,
ABSTRACT: In the emerging world of electronics the wireless devices are used by millions of people in their day to day life. Every person is constantly in contact with the cyberspace. Thus, ensuring the proper encryption facility is a major undertaking to offer dependable communication. The aim of this paper is to transmit a wireless penetration test and compares the encrypted key of a wireless network with a file that contains the captured packets as alphanumeric letters with the help of Kali Linux. This paper shows penetration tests in WEP and WPA/WPA2 protocols, and also the methods to develop these protocols using various attacks and to supply tools that separate the vulnerable access point protocol for the web administrators to protect their networks.
 WarrenHarrop, GrenvilleArmitage, Transparent IP Layer Interception on Enterprise 802.11 b/g networks.
 Kshitiz Saxena, The Analyses of Wireless Encryption to handshake mechanism in WPA-NITTTR, 2010.
 Guzman Santaf’e-An anomaly based Intrusion detection system for IEEE 802.11 networks, S2ISec information security labs, 2006.
 LIU Yong-lie, JIN Zhigang, Research on attack to WEP Protocol, Nov-2010.
 Popuri Manoj Kumar,Attacks and Mitigations over wireless network networks-Insecure Wireless world,The International Journal of Engineering & Sciences.-2013.
 Martin Beck,Practical attacks against WEP & WPA ,Erik Tews TU-Darmstadt-Nov,2008.
 Latha.P.H,Vasantha.R-Review of existing security protocols techniques and their performance analysis in WAN-IJETCAS-2014.
 Paul S.Henry and Hui Luo,AT&T Labs-Research wifi:what is next? December 2002.
 R.N.Rajotiya,PridhiArora,-Enhancing security of wifi network,The International Journal of Computer Application,June 2012.
 Paul Arna,Benefits and vulnarabilities of wifi protocol access2 (WPA2)-INFS612-Fall,2006.