The WPA4 Way Handshake

   

Added on  2020-03-23

10 Pages1342 Words65 Views
Table of Contents
1. Introduction.........................................................................................1
Lab 3-Worksheet.........................................................................................2
2. Conclusion...........................................................................................7
References.................................................................................................7
1
The WPA4 Way Handshake_1
1. Introduction
The WPA2-PSK will be studied along with the WPA4-way handshake. The brute force
password crack will be used to extract the passphrase. The wireless network traffic will be
collected to find out the WEP key. For doing this action, some software and hardware tools are
required. By using the SSID, the AP WEP configuration will be performed. AP is an access
point. To connect wired LAN into wireless device, AP is used as a hub. It provides secure
connection. The MAC addresses of wireless network will be monitored. For providing the gain
address to the AP, MAC addresses will be predicted. MAC stands for Media Access Control. It
is a unique identifier. It is used for making the communication at the data link layer. The
Microsoft windows 2012 server will be installed. It will perform the authentication in active
directory domain. The client and server configuration of will be done in windows 2012 server
using some software and hardware. To carry out the MAC, address spoofing, WEP and WPA2
encryption, implementation is carried out in Kali Linux. Kali Linux is chosen to carry out the
process since it is easy for handling the encryption and recording, capturing and storing the
traffic. Kali Linux is one of the Linux platform derived based on Debian. Kali Linux is used for
penetration testing. Kali Linux has its host applications like back track, wire shark. Kali Linux
can be easily installed via bootable CD OR DVD. Kali Linux is mostly used for carrying out
forensic activities. Kali Linux has many tools. Some of the tools are wire shark, kismet, Maitego,
Ettercap and many. Kali Linux is also used for Ethical hacking techniques.
Lab 3-Worksheet
WEP is the abbreviation of Wired Equivalent Privacy.WEP is nothing but a security
protocol.WEP encryption is used for the purpose of providing security.WEP key can be entered
in 64 bits or 128 bits. Usually 128 WEP key's are preferred. The WEP key is entered as
hexadecimal characters.WEP key provides two types of authentication. The two types of
verification are
Open System certification
Shared Key certification
WEP also faces some security problems. The security problems are overcome by WPA
OR WPA2 security policies.WEP protocol is used to provide the security to the wireless
2
The WPA4 Way Handshake_2
networks. It has flaws in its design that is it can be decoded very easily and hence its
higher version keys called WPA2 keys are used. The keys are not sent over the networks
but are stored in a safer position in the windows registry.
Objective
To collect the wireless network traffic
To find the WEP key using he data collected
Hardware
2 x Computers installed with Windows XP/7/8 (1 x for BT, 1 x Wireless Client)
2 x wireless adapters (1 x Kali VM, must be supported with packet injection, 1 x
Wireless Client, can be any)
1 x AP capable of configuring static WEP keys.
Lots of network traffic over wireless network.
Software
Kali Linux VM
Kali Linux is used as a hacking tool and to do thee penetration techniques, Kali Linux is
mostly preferred over other operating systems.WEP hacking can also be carried out using
Kali Linux. Kali Linux is easy and painless to use and hence kali Linux is chosen by most
of the attackers.
Wireless access point monitoring can be carried out using Kali Linux. To add safety and
security to the network, WEP and WPA tools are used. The network can be secured in all
forms and in all hoist devices. The host devices can also be a laptop, computer, tablet and
can be other devices also. Data traffic is the term which deals with the data transfer
protocols passing. There are many protocols that pass through different network. For the
passage of such protocols, Tunnels are used. Such tunnels can create traffic disturbance if
many protocols pass over it in a limited time. Such passage of protocols will create more
data traffic. Data traffic tracking can be very useful in hacking the process that process
3
The WPA4 Way Handshake_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wi-Fi Protected Access Assignment
|10
|1082
|67

The Brute Force Password Crack
|9
|1108
|143

AP WEP Configuration using WPA2-PSK and WPA4-way Handshake
|14
|1542
|380

Report on Data Encryption Standards for WiMAX networks
|9
|1865
|56

Understanding WPA, WEP, and WAP for Wi-Fi Security
|3
|693
|256

Wi-Fi Protected Access: A Secure Communication Protocol
|12
|782
|60