We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Wi-Fi Protected Access Essay Sample

essay
The whole doc is available only for registered users OPEN DOC
  • Pages:
  • Word count: 504
  • Category: wireless

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Wi-Fi Protected Access Essay Sample

Introduction:
Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs. Different WPA versions and protection mechanisms can be distinguished based on the (chronological) version of WPA, the target end-user (according to the method of authentication key distribution), and the encryption protocol used. There are many attacks to hack WPA/WPA2, in the environment of LINUX system (Using the Backtrack) we can find a lot of tools in Backteack5 and the most famous methods in backtrack are REAVER and Dictionary attacks. The second way use a dictionary file or world list that contain vary large amount of possible passwords to test it but if the password not stored on the file it will not be cracked ,on the other hand the REAVER method more able to crack WPA/WPA2

2-About REAVER method:
REAVER … it is an open source tool that brute forces WPA/WPA2 and exploits a security hole in wireless routers and can crack most routers. It’s tied to a PIN that’s hard-coded into the device. Reaver exploits a flaw in these PINs; the result is that, with enough time, it can reveal your WPA or WPA2 password.

* 3-How to protect yourself against Reaver attacks:
* Your network should be safe if you can simply turn off WPS (or, even better, if your router doesn’t support it in the first place). Even with WPS manually turned off through his router’s settings, Reaver was still able to crack his password but it reduces the possibility. * You could also set up MAC address filtering on your router (which only allows specifically white listed devices to connect to your network), but a sufficiently savvy hacker could detect the MAC address of a white listed device and use MAC address spoofing to imitate that computer. * SO if the open-source router firmware DD-WRT installed on the router, can unable to use Reaver to crack its password. As it turns out, DD-WRT does not support WPS It’s a good security upgrade, and DD-WRT can also do cool things like monitor your internet usage, set up a network hard drive, act as a whole-house ad blocker, boost the range of your Wi-Fi network.

4-example of REAVER attack:
First, if the REAVER not installed on your backtrack you must DOWNLOAD it….. Click the Terminal button in the menu bar (or click Applications > Accessories > Terminal). At the prompt, type: apt-get update

And then, after the update completes: apt-get install Reaver

Then you must to find your wireless card using airmon-ng ,so write ; airmon-ng

Then you must to put your wireless card into monitor mode: airmon-ng start wlan0

Then you must to Find the BSSID(MAC) of the router you want to crack using airodump-ng on monitoring interface you have, so write; airodump-ng mon0

Then when you chose your target, copy the BSSID to do the Reaver on it, and it takes arguments –i[your interface] and -b [BSSID] –vv[vector, vector]; reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Kudler Fine Foods

Introduction Kudler Fine Foods has established that they want to design a WAN to tie three different locations together and make the internal network in each store a Wireless Local Area Network. Then, they are requesting Voice Over Internet Protocol to each multi store network. Various protocols make all this happen. Transfer Control Protocol and Internet Protocol are the foundation of data transfer. TCP is...

A Survey of Automated Gsm Based Irrigation...

Abstract Agriculture is a source of livelihood of majority Indians and has great impact on the economy of the country. In a country like India, where climatic conditions vary substantially and irrigation facilities are poor, sustainable agriculture practices that conserve resources and make a farmer’s life easier are absolutely essential. This paper proposes a system that makes use of contemporary technologies- wireless sensor networks, GSM...

Buzz Technology

Abstract This paper presents a new version of LEACH protocol called VLEACH which aims to reduce energy consumption within the wireless network. We evaluate both LEACH and V-LEACH through extensive simulations using OMNET++ simulator which shows that VLEACH performs better than LEACH protocol. Broadcasting, Clustering, LEACH protocol, VLEACH. Keywords 1. Introduction Wireless sensor network (WSN)[2,3] consists of hundreds and even thousands of small tiny devices...

Wireless Control for Industrial Instruments

Jigar Daki Dhaivat Vasoya J.M.Rathod A.B.Bambhaniya EL Student EL Student AP, EL Department AP, ET Department B.V.M. engineering college B.V.M. engineering college B.V.M. engineering college B.V.M. engineering college V.V. nagar, India V.V. nagar, India V.V. nagar, India. V.V. nagar, India [email protected] [email protected] [email protected] [email protected],in Abstract-It is a microcontroller based wireless equipment controller that can switch on or switch off devices at a desire time interval...

Cable And Wireless

1, Introduction Overview Cable and Wireless plc is a British telecom company that has straddled more than one century and moved through sharply different and rapidly evolving phases of global politics and business. As an old British company, it has participated in empire building by carrying its operations to the furthest reaches of the British Empire. It has survived the environmental transition which resulted from...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Couldn't Find What You Looking For?

Get access to our huge knowledge base which is continuously updated

Next Update Will Be About:
14 : 59 : 59
Become a Member