Penetration testing of WPA and WPA2 security protocols and analysis of security solutions
Keywords:
network security, WPA, WPA2, security protocols, security solutionsAbstract
This paper will discuss the security protocols of wireless computer networks. WEP, WPA / WPA2 encryption and the reasons for the existence of such protocols and how they are applied will be explained. The security of WEP and WPA / WPA2 protocols will be tested with practical examples and penetration testing in a secure environment, using Airgeddon and Pixiewps tools. The operating system to be used is ParrotOS.References
Beaver K., Davis P.,Hacking wireless networks for dummies, Indianapolis, Wiley Publishing 2005.
Jevremović S., Bezbednost elektronskog poslovanja, Beograd, ITS, 2015.
Jevremović S.,Sigurnost i zaštita informacionih sistema, ITS, 2015.
Macaulay T., Hardening IEEE 802.11 wireless networks, Canada, EWA, 2002.
Monte M., Network attacks and exploitation, Indianapolis, John Wiley & Sons Inc., 2015
Osterhage W., Wireless network security, Frankfurt, Goethe-Universität, 2018
Wifi certified WPA3,
<https://www.wi-fi.org/discover-wi-fi/security>( visited on28.11.2020)
Dragonblood: Analyzing the DragonflyHandshake of WPA3 and EAP-pwd,
<https://eprint.iacr.org/2019/383.pdf>(visited on04.12.2020)
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2,
<https://papers.mathyvanhoef.com/ccs2017.pdf>(visited on02.12.2020)
Saračević M., Selimi A., Plojović Š., Some Specific Examples of Attacks on Information Systems and Smart Cities Applications, in Book: Cybersecurity and Secure Information Systems, Springer Nature Switzerland AG, 2019.