We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Wi-Fi Protected Access Essay Sample

  • Pages: 2
  • Word count: 548
  • Rewriting Possibility: 99% (excellent)
  • Category: wireless

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Introduction of TOPIC

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs. Different WPA versions and protection mechanisms can be distinguished based on the (chronological) version of WPA, the target end-user (according to the method of authentication key distribution), and the encryption protocol used. There are many attacks to hack WPA/WPA2, in the environment of LINUX system (Using the Backtrack) we can find a lot of tools in Backteack5 and the most famous methods in backtrack are REAVER and Dictionary attacks. The second way use a dictionary file or world list that contain vary large amount of possible passwords to test it but if the password not stored on the file it will not be cracked ,on the other hand the REAVER method more able to crack WPA/WPA2

2-About REAVER method:
REAVER … it is an open source tool that brute forces WPA/WPA2 and exploits a security hole in wireless routers and can crack most routers. It’s tied to a PIN that’s hard-coded into the device. Reaver exploits a flaw in these PINs; the result is that, with enough time, it c

an reveal your WPA or WPA2 password. * 3-How to protect yourself

Sorry, but full essay samples are available only for registered users

Choose a Membership Plan
against Reaver attacks:
* Your network should be safe if you can simply turn off WPS (or, even better, if your router doesn’t support it in the first place). Even with WPS manually turned off through his router’s settings, Reaver was still able to crack his password but it reduces the possibility. * You could also set up MAC address filtering on your router (which only allows specifically white listed devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a white listed device and use MAC address spoofing to imitate that computer. * SO if the open-source router firmware DD-WRT installed on the router, can unable to use Reaver to crack its password. As it turns out, DD-WRT does not support WPS It’s a good security upgrade, and DD-WRT can also do cool things like monitor your internet usage, set up a network hard drive, act as a whole-house ad blocker, boost the range of your Wi-Fi network.

4-example of REAVER attack:
First, if the REAVER not installed on your backtrack you must DOWNLOAD it….. Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type: apt-get update

And then, after the update completes: apt-get install Reaver

Then you must to find your wireless card using airmon-ng ,so write ; airmon-ng

Then you must to put your wireless card into monitor mode: airmon-ng start wlan0

Then you must to Find the BSSID(MAC) of the router you want to crack using airodump-ng on monitoring interface you have, so write; airodump-ng mon0

Then when you chose your target, copy the BSSID to do the Reaver on it, and it takes arguments –i[your interface] and -b [BSSID] –vv[vector, vector]; reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv

We can write a custom essay on

Wi-Fi Protected Access Essay Sample ...
According to Your Specific Requirements.

Order an essay

You May Also Find These Documents Helpful

Kudler Fine Foods

Introduction Kudler Fine Foods has established that they want to design a WAN to tie three different locations together and make the internal network in each store a Wireless Local Area Network. Then, they are requesting Voice Over Internet Protocol to each multi store network. Various protocols make all this happen. Transfer Control Protocol and Internet Protocol are the foundation of data transfer. TCP is the protocol that the internet, email and ftp highly rely on. Without TCP/IP there would be no internet, email or FTP. Two other protocols designed to process packets throughout the network are X.25 and Frame Relay. For this scenario Frame Relay will be used so I will not provide a brief description about X.25. Frame relay was based on the X.25 protocol and even though the option isn’t there to check an error, which is the end stations responsibility. Frame relay does reduce the amount...

A Survey of Automated Gsm Based Irrigation...

Abstract Agriculture is a source of livelihood of majority Indians and has great impact on the economy of the country. In a country like India, where climatic conditions vary substantially and irrigation facilities are poor, sustainable agriculture practices that conserve resources and make a farmer’s life easier are absolutely essential. This paper proposes a system that makes use of contemporary technologies- wireless sensor networks, GSM and SMS – to provide the farmer with the ability to handle the water level in the field remotely and in real time. Keywords Wireless Sensor Networks, GSM, SMS, Sprinkler, Agriculture, India, Mobile I. Introduction Even in the modern era of industrialization, agriculture plays a very significant role in the overall socio-economic development of India. India has an agriculture based economy. 43% of India’s territory comes under agricultural lands. Agriculture along with other related fields like forestry and logging provides employment to 52% of India’s...

Buzz Technology

Abstract This paper presents a new version of LEACH protocol called VLEACH which aims to reduce energy consumption within the wireless network. We evaluate both LEACH and V-LEACH through extensive simulations using OMNET++ simulator which shows that VLEACH performs better than LEACH protocol. Broadcasting, Clustering, LEACH protocol, VLEACH. Keywords 1. Introduction Wireless sensor network (WSN)[2,3] consists of hundreds and even thousands of small tiny devices called sensor nodes distributed autonomously to monitor physical or environmental conditions, such as temperature, sound, vibration, pressure and motion at different locations. Energy plays an important role in wireless sensor networks because nodes are battery operated. Consequently many protocols have been proposed in order to minimize the energy consumption of these nodes. Each node in a sensor network is typically equipped with one or more sensors, a radio transceiver or other wireless communications device, a small microcontroller, and an energy source, since in most Wireless...

Popular Essays


Emma Taylor


Hi there!
Would you like to get such a paper?
How about getting a customized one?