Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/45644
Full metadata record
DC FieldValueLanguage
dc.contributor.authorBoretskyy, Taras
dc.date.accessioned2020-02-18T08:58:33Z-
dc.date.available2020-02-18T08:58:33Z-
dc.date.created2019-02-26
dc.date.issued2019-02-26
dc.identifier.citationBoretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.
dc.identifier.urihttps://ena.lpnu.ua/handle/ntb/45644-
dc.description.abstractIn this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection.
dc.format.extent1-6
dc.language.isoen
dc.publisherLviv Politechnic Publishing House
dc.relation.ispartofAdvances in Cyber-Physical Systems : scientific journal, 1 (4), 2019
dc.relation.urihttp://www.aircrack-ng.org/
dc.relation.urihttp://csrc.nist.gov/
dc.relation.urihttp://www.haveibeenpwned.com/
dc.relation.urihttp://www.3wifi.stascorp.com/
dc.subjectWi-Fi security
dc.subjectWPA2-PSK
dc.subjectdictionary attack
dc.subjecthacking
dc.subject4-way handshake
dc.subjectPBKDF2 authentication protocol
dc.titleThe methods of protection and hacking of modern WI-FI networks
dc.typeArticle
dc.rights.holder© Національний університет “Львівська політехніка”, 2019
dc.rights.holder© Boretskyi T., 2019
dc.contributor.affiliationLviv Polytechnic National University
dc.format.pages6
dc.identifier.citationenBoretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.
dc.relation.references1. S. Fluhrer, I. Mantin, and A. Shamir. “Weaknesses in the key scheduling algorithm of RC4”, International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.
dc.relation.references2. M. Vanhoef and E. Ronen. “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”, p. 1–16.
dc.relation.references3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].
dc.relation.references4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.
dc.relation.references5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]
dc.relation.references6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.
dc.relation.references7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].
dc.relation.references8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].
dc.relation.referencesen1. S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.
dc.relation.referencesen2. M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1–16.
dc.relation.referencesen3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].
dc.relation.referencesen4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.
dc.relation.referencesen5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]
dc.relation.referencesen6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.
dc.relation.referencesen7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].
dc.relation.referencesen8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].
dc.citation.volume4
dc.citation.issue1
dc.citation.spage1
dc.citation.epage6
dc.coverage.placenameЛьвів
Appears in Collections:Advances In Cyber-Physical Systems. – 2019. – Vol. 4, No. 1

Files in This Item:
File Description SizeFormat 
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6.pdf178.3 kBAdobe PDFView/Open
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6__COVER.png1.05 MBimage/pngView/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.