https://oldena.lpnu.ua/handle/ntb/45644
Title: | The methods of protection and hacking of modern WI-FI networks |
Authors: | Boretskyy, Taras |
Affiliation: | Lviv Polytechnic National University |
Bibliographic description (Ukraine): | Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6. |
Bibliographic description (International): | Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6. |
Is part of: | Advances in Cyber-Physical Systems : scientific journal, 1 (4), 2019 |
Issue: | 1 |
Volume: | 4 |
Issue Date: | 26-Feb-2019 |
Publisher: | Lviv Politechnic Publishing House |
Place of the edition/event: | Львів |
Keywords: | Wi-Fi security WPA2-PSK dictionary attack hacking 4-way handshake PBKDF2 authentication protocol |
Number of pages: | 6 |
Page range: | 1-6 |
Start page: | 1 |
End page: | 6 |
Abstract: | In this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection. |
URI: | https://ena.lpnu.ua/handle/ntb/45644 |
Copyright owner: | © Національний університет “Львівська політехніка”, 2019 © Boretskyi T., 2019 |
URL for reference material: | http://www.aircrack-ng.org/ http://csrc.nist.gov/ http://www.haveibeenpwned.com/ http://www.3wifi.stascorp.com/ |
References (Ukraine): | 1. S. Fluhrer, I. Mantin, and A. Shamir. “Weaknesses in the key scheduling algorithm of RC4”, International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24. 2. M. Vanhoef and E. Ronen. “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”, p. 1–16. 3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018]. 4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8. 5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018] 6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004. 7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018]. 8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018]. |
References (International): | 1. S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24. 2. M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1–16. 3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018]. 4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8. 5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018] 6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004. 7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018]. 8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018]. |
Content type: | Article |
Appears in Collections: | Advances In Cyber-Physical Systems. – 2019. – Vol. 4, No. 1 |
File | Description | Size | Format | |
---|---|---|---|---|
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6.pdf | 178.3 kB | Adobe PDF | View/Open | |
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6__COVER.png | 1.05 MB | image/png | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.