What is it about?

This project focuses on performing security assessment on wireless networks, and to crack the password assigned to it. The idea of wireless network brings to mind lot of ways of attacking and penetrating a network compared to the traditionally wired network. Because wireless typically extends beyond walls and boundaries, it has become prone to attacks. This project intends to find the password of near-by wireless networks and focuses on performing security assessment on wireless networks, and to crack the password assigned to it. As WPA2 is considered as the most secured password encryption algorithm for wireless network, we will be performing penetration testing on it and will crack the password for WPA2 encryption. This project mimics the penetration testing scope to find the password of one of the trusted wireless network.

Featured Image

Why is it important?

This project intends to find the password of near-by wireless networks. Often people use easy to remember password consisting of alphabets & numbers or date of birth or dictionary word. This project mimics the penetration testing scope to find the password of one of the trusted wireless network [1]. We should to know what the Cracking of wireless networks is; it is the defeating of security devices in Wireless local-area networks. Wireless local-area networks WLANs also called Wi-Fi networks are inherently vulnerable to security lapses that wired networks are exempt from [2]. Cracking is a kind of information network attack that is akin to a direct intrusion. There are two basic types of vulnerabilities associated with WLANs: those caused by poor configuration and those caused by weak encryption [3]. We will be working on some of the tools/software’s present in backtrack which have different capabilities starting from finding near-by access points, capturing packets and then software’s used to break the password from those captured packets [4]. As WPA2 is considered as the most secured password encryption algorithm for wireless network, we will be performing penetration testing on it and will crack the password for WPA2 encryption [5].

Perspectives

The entire data was cleaned up, systems were wiped off. We also notified law enforcement and the Internet Service Provider and stakeholders that the penetration test is concluded. Also we destroyed the information and data gathered during the process. We are also happy to inform that no unethical incidents, physical or cyber happened during the pentest process. Archiving: The procedure and final results would be stored with us for future analysis.

M.Sc. Lecturer Mohammed Fakhrulddin Abdulqader
University of Kirkuk

Read the Original

This page is a summary of: Penetration Testing of Wireless Networks, Kirkuk University Journal-Scientific Studies, September 2016, Kirkuk University,
DOI: 10.32894/kujss.2016.124737.
You can read the full text:

Read

Contributors

The following have contributed to this page