Skip navigation

putin IS MURDERER

Please use this identifier to cite or link to this item: https://oldena.lpnu.ua/handle/ntb/45644
Title: The methods of protection and hacking of modern WI-FI networks
Authors: Boretskyy, Taras
Affiliation: Lviv Polytechnic National University
Bibliographic description (Ukraine): Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Львів : Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.
Bibliographic description (International): Boretskyy T. The methods of protection and hacking of modern WI-FI networks / Taras Boretskyy // Advances in Cyber-Physical Systems : scientific journal. — Lviv Politechnic Publishing House, 2019. — Vol 4. — No 1. — P. 1–6.
Is part of: Advances in Cyber-Physical Systems : scientific journal, 1 (4), 2019
Issue: 1
Volume: 4
Issue Date: 26-Feb-2019
Publisher: Lviv Politechnic Publishing House
Place of the edition/event: Львів
Keywords: Wi-Fi security
WPA2-PSK
dictionary attack
hacking
4-way handshake
PBKDF2 authentication protocol
Number of pages: 6
Page range: 1-6
Start page: 1
End page: 6
Abstract: In this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection.
URI: https://ena.lpnu.ua/handle/ntb/45644
Copyright owner: © Національний університет “Львівська політехніка”, 2019
© Boretskyi T., 2019
URL for reference material: http://www.aircrack-ng.org/
http://csrc.nist.gov/
http://www.haveibeenpwned.com/
http://www.3wifi.stascorp.com/
References (Ukraine): 1. S. Fluhrer, I. Mantin, and A. Shamir. “Weaknesses in the key scheduling algorithm of RC4”, International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.
2. M. Vanhoef and E. Ronen. “Dragonblood: A Security Analysis of WPA3’s SAE Handshake”, p. 1–16.
3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].
4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.
5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]
6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.
7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].
8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].
References (International): 1. S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1–24.
2. M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1–16.
3. Aircrack-ng. [Online]. Available: http://www.aircrack-ng.org/ [Accessed: Nov. 25, 2018].
4. IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.
5. Federal Information Processing Standards (FIPS) Publication 197. Announcing the Advanced Encryption Standard (AES). November 26, 2001. Available at http://csrc.nist.gov/ publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]
6. NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.
7. Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: http://www.haveibeenpwned.com/ [Accessed: Nov. 25, 2018].
8. Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: http://www.3wifi.stascorp.com/ [Accessed: Nov. 25, 2018].
Content type: Article
Appears in Collections:Advances In Cyber-Physical Systems. – 2019. – Vol. 4, No. 1

Files in This Item:
File Description SizeFormat 
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6.pdf178.3 kBAdobe PDFView/Open
2019v4n1_Boretskyy_T-The_methods_of_protection_1-6__COVER.png1.05 MBimage/pngView/Open
Show full item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.