Thursday, April 4, 2019

Strategies for Breaking Wireless Protocols

Strategies for Breaking receiving set communications protocolsCHAPTER 1 devilion1.1 Background give outing of radio receiver Net melt is a result of a research Project carried issue by University of Hawaii. Initi e rattling(prenominal)y its c completelyed as Aloha net, but later it purposed to call as radio set Local bea Ne twork or wireless fidelity. At the beginning of aloha net, is capable of slayring 1 to 2 mbps selective information. but oer the last a few(prenominal)er years aloha net changed to wireless local area network and it came with so numerous enhancements to the sign technology.Newer days, radiocommunication lucres become to a greater extent popular than the wired net incomes. The main reason for this is, radiocommunication meshs ar high in portability and the flexibility, increased productivity, and lower installation cost. receiving set Network Devices let utilisationrs to move their laptops from angiotensin-converting enzyme place to an other without warring advantageously-nigh their mesh topology joinivity. Minimizing the wiring gives the maximum flexibility over the network and it reduces the wiring cost for the only(prenominal) network infrastructure.However, when we comparing the credentials factor, wireless networks are to a greater extent compromising to attack by outsider than the wired network. Main reason for this is, some(prenominal)one terminate see and wreak the initial connection by the wireless network. But establishing the initial connection in a wired network is bit difficult than the wireless network.Loss of confidentiality like rallying cry cracking and man in the mediate attacks are typically associated with wireless networks. Some other mode, this bod of attack can comfortably action in wireless Networks rather than the wired network.Even though a wireless network has this kind of problems, its not a failed concept. The main reason for that is we can treasure a wireless network in maximum and make invincible from unauthorised affairrs or attackers.Configuring the wireless devices correctly and accurately can minimise the attacks. We are tone ending to treat about this topic in future.1.2 ObjectivesBreaking wireless protocols is the main verifiable in this project. Mostly the WEP, WPA and WPA2 will be my major preference. So the polish of this research is break the wireless protocol and get selective information from the wireless devices and the network.1.2.1 Comparison of Hacking Tools Available. there are lots of tools that can use to hack a wireless protocol. Some of the tools are very user friendly. We can install it on our Windows Based Systems and it does our work very easily. Those tools are ascorbic acid% Graphical User Interface and very weak to use. AirCrack-ng Windows mutation is the common example.But Some Other tools are addressable we need to piddle several(prenominal) technical knowledge to use those tools. Mainly those tools run on command base mode and runnel platform is Linux. These tools do not suffer any graphical user Interface, and bit difficult to occur out without any proper guidance. But the last-place result is very accurate than the windows meter reading.The major difference betwixt these two types of tools are the package which runs on linux is more accurate than the Windows version. So I boast pertinacious to use Linux version hacking software system to harbor out my testing.But to hack a wireless network we need few of software to download from the internet. And so we can install those on a Linux tool and we can start the research. But, I think its very easy to use a one operate System rather than struggling with lots of softwares. So I decided to download latest version of worlds famous Hacking Operating System Back footmark. It has built in hacking tools that need to hack a wireless network.1.2.2 Downloading related software.Back Track is free to download, and its contribute so urce. whateverone can download Back Track from its developers web site www.backtrack-linux.org for free. So I have downloaded the latest version of Back Track v4 to carry out my research. We will discuss about BackTrack in further chapters.1.2.3 Cracking WEP Using AirCrack-ngIn order to crack a WEP parole, I have chosen few amazing tool. That is BackTrack 4 Hacking Operating System. It has all the hacking tools to crack a WEP Network. Airodump-ng can use to get the information about the wireless network and then I can use the Aircrack-ng to crack the password.1.2.4 Cracking WPA Using AirCrack-ngWe Can Use the same Process to Crack the WPA utilize AirCrack-ng. Same as in WEP I am going to use the Airodump-ng and Airoreply-ng to collect all the informations about the wireless Network and AirCrack-ng to decrypt the Password.1.2.5 Cracking WPA2 Using CowpattyIn here, I am going to use a special cracking Software to crack WPA2. The software is Cowpatty. Cowpatty bit different than Air crack-ng. And cowpatty specially designed to crack WPA and WPA2 Passwords.All these tools are built-in tools which we can find in the BackTrack4 Linux found operating system. So I dont need to download these softwares from the internet.1.3 Dissertation StructureThis corroboration mainly divided in to 4 Main Chapters. Including entire Practical and theoretical concepts.Chapter 1 footIn this section, I am going to give a introduction about what is wireless Network, Start of the Wireless Network and Basic Problems that wireless Networks faced. In the Second Section ex on the face of it about the whole Research objectives and aims.Chapter 02 Literature ReviewThis Chapter Consist all the theoretical informations relating to my research. In here I am discussing about wireless Networks and its Types, Wireless Network Devices, Security Methods that WLAN Uses, WLAN Security Protocols, Deep intervention about WEP, WPA and WPA2, Protocol Hacking tools like Air Crack-ng, Cowpatty, and Hacki ng Methods that use by the Hacking tools. Eg Dictionary Attacks, Brute Force Attacks etc.Chapter 03 MethodologyIn here, I am going to show my Practical Work that I have done all over my research. Installing the Hacking OS, Use of Hacking tools, Problems Faced all over the project and the final results will be my main concerns.Chapter 04 Result and DiscussionsIn this section I am comparing all the results I have gain all over my project.Chapter 05 ConclusionsThis Chapter will be my conclusions of the Research. In here i am planning to compare my final result and the objectives in my initial project proposal.CHAPTER 02 Literature persuasion2.1 Wireless NetworksWireless Networks enables to communicate devices without any physical media. These Networks are divided to three main categories match to their communication level. Those are, Wireless Local Area Network, Wireless Wide Area Network, Wireless Personnel Area Network.Wireless Wide Area Network has larger coverage than the WLAN and WPAN. WWAN uses 2G or 3G Cell re piece Networks to connect each and every device in the network. WLAN represents local area network that connected using wireless access point or a wireless router includes 802.11. WPAN is a small network topology. This includes Bluetooth and Infrared technologies.2.1.1 Wireless Local Area NetworksAs I Mentioned earlier, Wireless LANs has more portability and flexibility over traditional Wires Local Area Networks. In WLAN, All the Computers and other devices connect to each other using Wireless addition Points also called as APs. And Access points communicated with the Wireless Network Adaptors that fixed in to computers. Access Points commonly has coverage are up to 75-100 meters. In that area users can move their laptops and other wireless devices tour maintaining their network connections. We can connect access points together and expand the wireless LANs coverage.In my thesis, I am going to discuss more about wireless LAN in further chapt ers.2.1.2 Wireless Wide Area NetworksThis is the virtually familiar wireless Network type for everyone. This networks are Combinations of few WLANs. In these networks, Antennas acts as the access point for all WLANs. There are connections mingled with Antennas to Antennas, to expand the overhaul of the network. quick Phone Networks also a good example for WWAN Networks.2.1.3 Wireless Personnel Area NetworksThese Networks are so smaller when comparing to the other networks. It does not give much coverage as other 2 network type we discuss earlier. And this network does not require Main Access Point to make the connection with other WPAN Devices. Source WPAN device directly connect to the other WPAN device when its needs to transfer selective information.2.2 Wireless Local Area NetworksThis is the most important topic of my thesis. We are going to discuss about this topic all over the project. As I mentioned in my objectives I am going to crumple the security of WLAN and Break few of WLAN Protocols. Before that we need to get a crown Idea about What is WLAN? and How it operates?WLAN is same as the wired Local Area Network. But the only difference is, its using wireless method to connect all devices. WLAN combined with the thickening Station and the Wireless Access point.The Client Station connects to the AP (Access point) using the wireless Network Adaptor. We can connect the wireless adaptor to the computer using Personal Computer Memory Card International (PCMCIA) slot or using the USB Port.IEEE 802.11 is the Standard of WLAN technology. The coverage of the Wireless network totally relay on the Strength of the Wireless Access Point. Normally its can covers up to 75-100 meters circular area.2.2.1 Architecture of 802.11 StandardsThis architecture allows initiating a peer to peer connection between Client Station and the wireless Network based on access point in an infrastructure network (WLAN). The coverage area of an access point called as a Cell. A Cell also called as Basic Service Set (BSS). The assembly other cells of the infrastructure network called as Extended Service Set (ESS).Any access point that work with 802.11 standards has this 2 entropy sets for their functionality.BSS is the most important data set in the Access point. BSS contain all the information about wireless Network. This is the security cite negotiation protocol of the Access point. BSS consist of APs computer hardware name, Communication protocol informations, Signal strength etc.The Access Point identify in the WLAN using a specific identifier. This is called as Basic Service Set Identifier (BSSID). When Laptop or any other wireless device needs to connect to wireless network via access point, the guest institutionalise (Eg Laptop) searches for the available access points in the area by releasing discovery packets. If there any access points available, APs respond to the guest invest by sending the BSSID.Normally BSSID is in a Human exonerated format . BSSID also called as AP Name or Router Name by Technical soulals. This identifier always represents a specialized Access point. Likewise each and every access point of the network has its own BSSID.NOTEBSSID is very important to accomplish my main objective of the project. We need to retrieve the routers BSSID before we crack the routers password. We can discuss about the retrieving methods in future chapters.2.2.2 Advantages of WLANsFollowing are the advantages.Increased Mobility- Users can be mobile part accessing to all the network resources.Fast Installation Installation of the network is very quick since there no adding wires like wired network.Flexibility anyone can easily install and uninstall a small wireless Network.2.2.3 Wireless Protocols Use in Wireless NetworksThere are 3 main wireless protocols use by the 802.11x wireless networks. Those are,Wired Equivalent occultivenessThis Protocol primarily protect the WLAN uses being a victim from eavesdropping. WEP uses 64 bit RC4 key to generate encrypted data and then those encrypted data transferred over the network.Wi-Fi defend Access This is introduced by the Wi-Fi Alliance to overcome certain restrictions in WEP. This uses Temporal Key equity Protocol (TKIP) to encrypt the wireless data packets.Wi-Fi Protected Access Version 2 This is the latest movement in wireless LAN Protocols. Only the Difference is WPA 2 introduces sensitive AES algorithm to be much more ensure than the WPA.These 3 protocols widely using in wireless Networks. Every protocol has significant advantages and disadvantages. In the next chapter I am going to illustrate gets, advantages and disadvantages of each and every protocol.2.2.4 Wired Equivalent Privacy (WEP)WEP is an earmark protocol that use in 802.11 wireless networks to secure all the transmittal data. This protocol introduced in 1997 and main intention was increasing the confidentiality of the data than wired network. Any wireless network that uses WEP encr ypt the data packets using RC4 cipher stream generated by a 64 bit RC4 key.IEEE 802.11 has few basic features when it comes to Security. These concerns put up a better security for the wireless environment. This all security elements embedded in to the wireless network protocols. Following are the basic security concerns in a wireless Network. stylemarkThis is the main goal of the wireless protocols. This means identifying the Client Station by using a password. If any client station failed to comply with this requirement the AP will deny giving the access to the Client Station.IntegrityIn here, the data should not be changed while it transmitting from the AP and/or to the AP. That mean those data should not be a victim of active attack.Confidentialityin this goal, the Protocol should protect the security of all data elements that transmit. In other word, the data should not be a victim of passive attacks.2.2.4.1 stylemark802.11 Networks have 2 kinds of hallmark methods. straig ht-from-the-shoulder System corroboration and Shared Key stylemark.802.11 AuthenticationOpen System AuthenticationShared Key AuthenticationAny Client Station can join The Station should try theTo the network without authentication Network password in order to joinNetworkIn Open system authentication does not use any cryptographic password to gain access to the network. Any client station can connect to the network and use the network resources. As an example, Internet facilitys in a public locations like Air Port or a Bus Station. In these places anyone can connect their Laptop or PDAs to the Wireless Access Point and start browse the internet. No Password required at all to login to the network.In open system method, the client station sends its MAC send for just as a reference to the Access point. whence the AP makes that client as a member of that APs network. The major problem with this authentication mode is its vulnerable to attack.Shared key authentication is password ba sed authentication model. The client must have the password to make the connection with AP. when client made a request to the AP that asking the connection, the AP generate a repugn and send it to the client station. If the client station responds to that challenge correctly AP gives the permission to be a member of wireless network. Figure 2.7 give the clear thought about the Shared Key authentication.Authentication RequestChallengeResponseConfirm the Result2.2.4.2 Integrity802.11 Standards also concerns about the uprightness of the data transmitted. This always checks the data content whether it got changed while happening the transmitting process. It uses Cyclic Redundancy Check (CRC) approach to check the content of data. formerly the CRC completed those data encrypted by using the RC4 key Stream. On the receiving end, data will be decrypted and again check for CRC to check the truth of the data. If the receiving end CRC value does not match with the initial CRC value the d ata will be rejected and retransmitting will be required.WEP Uses an algorithm called Stream Cipher to encrypt all the data. It expand on the spur of the moment version of key in to a random key stream. The sender encrypts the Plain text on with the bunco key and creates the cipher text. In the receiver end has the same short key to decrypt the data. Once the data stream received by the recipient, it uses the short key to generates cipher text back to plain text.If one data bit lost on its way to the goal, the decryption process will direct the data in to incorrect information. To prevent this problem WEP has Cyclic Redundancy Check to keep up the essence Integrity correctly.2.2.4.3 Privacy802.11 standards use cryptographic techniques to concord Privacy. It uses RC4 Symmetric Keys to protect the data. Normally 802.11 standards support different cryptographic key lengths to protect the data from a attack.Generally, WEP supports 40 bit cryptographic key size for the shared key. But numerous vendors support different key sizes like 104 bits and 128 bits. Increasing the key size increases the security of the cryptographic technique.2.2.4.4 Problems with WEPEven though WEP has so many security measurements to protect the transmitting data, it has few failures. These failures make the way, an attacker to break the security of WEP and lost the Integrity and privacy of the transmitting data using WEP.2.2.4.4.1 Shared WEP KeyWEP Uses single security key to Access the network. So this key should be distributed to all the users who access the network. So this security key might go to an attacker very easily who trying to get the access to the network.2.2.4.4.2 WEP Key SizeAs I mentioned earlier, WEP uses 40 bit cryptologic Key Size. This key can be crack very easily regardless of the time. So the encoding key is not sufficient to provide a better security for data.2.2.5 Wi-Fi Protected AccessThis is a WLAN protocol created by the Wi-Fi alliance. This is created because of several weakness of the WEP Protocol. WPA has some advanced features when comparing with WEP. To get the optimum performance from the WPA,The WPA protocol implements the majority of the IEEE 802.11i standard, and was intended as an intermediate measure to take the place of WEP while 802.11i was prepared. Specifically, the Temporal Key Integrity Protocol (TKIP), was brought into WPA. TKIP could be implemented on pre-WPA wireless network larboard cards that began shipping as far back as 1999 through firmware upgrades. Because the changes required few modifications on the client than on the wireless access point, most pre-2003 APs could not be upgraded to support WPA with TKIP. Researchers have since discovered a flaw in TKIP that relied on older weaknesses to retrieve the key stream from short packets to use for re-injection and spoofing. wiki/WPA2.2.5.1 Features of WPAWPA uses Temporal Key Management (TKIP) as its Key encryption system. WPA does, Data Encryption and und erstanding based on TKIP technology. It uses 128 bits for encryption using RC4 cipher.2.2.5.2 Temporal Key ManagementTKIP on with the WPA has introduced three security features to overcome some security issues that come with WEP networks. TKIP mixing the security key with the initialization vector before it pass it to the cipher routine. In our case TKIP uses RC4 as the cipher. This method avoids certain kind of key attacks that came along with WEP. And then, WPA protects the data packets against reply attacks by implementing a sequence counter to the data stream. Finally its implements a cognitive content integrity check called MIC to check the consistency of the data stream.As i mentioned earlier, TKIP uses Rivest Cipher 4 (RC 4) as its cipher. Rekeying, also an important feature of TKIP. And the most important feature is TKIP always ensure to send data with a Unique Encryption key.But in certain situations it uses same mechanism like WEP. So TKIP also vulnerable to some kind of attacks which WEP faces. Any how the advance development of cognitive content Integrity Check, isolate Key Hashing on every packet, Sequence Counter prevents those attacks successfully.The Best thing is TKIP resolving most of the problems came along with the WEP. The next section discuss about that.2.2.5.3 Michael Message Integrity CodeUnlike WEP, WPA uses special feature to check the integrity of the transmitted message. This is called as Message Integrity Code (MIC). This is also called as Michel. This is a short cryptographic checksum that use to demonstrate a message. This is also known as Message Authentication Code (MAC).This is a 64 bit algorithm that controls several types of attacks like, Splicing Attacks, Payload Truncation, and Fragmentation Attacks.2.2.5.3 extensile Authentication Protocol (EAP)EAP is an Authentication Method that widely use in wireless networks. This is not specifically designed for wireless networks. This can be use to authentication in wired netw ork as well.EAP use to transmit the packets containing Authentication informations. WPA and WPA2 Networks supports 5 EAP Authentication Mechanisms as it Authentication Standards. Those are, EAP-TLS, EAP-SIM, EAP-AKA, PEAP, restrict.2.2.5.3.1 EAP-TLSEAP-Transport Layer Security is well known among Protocol for wireless communication. TLS provide very strong confidentiality for the User Credentials. This uses PKI to secure the communication between the AP and the RADIUS Server.EAP-TLS is the original, standard wireless LAN EAP authentication protocol. Although it is rarely deployed, it is still considered one of the most secure EAP standards available and is universally supported by all manufacturers of wireless LAN hardware and software. Wiki/EAPA compromised password is not enough to break into EAP-TLS enabled systems because the hacker still needs to have the client-side mysterious key. The highest security available is when client-side keys are ho employ in smart cards. This is because there is no way to steal a certificates corresponding private key from a smart card without stealing the card itself. Wiki/EAP2.2.5.3.2 EAP-SIMEAP for Subscriber Identity Module utilize for authentication and Session key distribution using the Global System for spry Communication (GSM) SIM. Wiki/EAP2.2.5.3.3 EAP-AKAEAP for Authentication and Key Management Agreement is used for Authentication and session key distributing using the Universal Mobile Telecommunication System (UMTS). wiki / EAP2.2.5.3.4 PEAPPEAPis a joint proposal by lake herring Systems, Microsoft and RSA Security as an open standard. It is already widely available in products, and provides very good security. It is similar in design to EAP-TTLS, requiring only a legion-side PKI certificate to create a secure TLS tunnel to protect user authentication. Wiki/EAPThere were two PEAP gunman-types certified for the updated WPA and WPA2 standard. They arePEAPv0/EAP-MSCHAPv2PEAPv1/EAP-GTCThe terms PEAPv0 and PEAPv1 refer to the outer authentication method, the mechanism that creates the secure TLS tunnel to protect subsequent authentication transactions. EAP-MSCHAPv2, EAP-GTC, and EAP-SIM refer to the inner authentication method which facilitates user or device authentication. Wiki/EAP2.2.5.3.5 LEAPThe Lightweight Extensible Authentication Protocol (LEAP)A proprietary EAP method developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. Wiki/EAPLEAP uses a modified version of MS-CHAP, an authentication protocol in which user credentials are not strongly protected and are thus easily compromised. along these lines, an exploit tool called ASLEAP. wiki/EAP2.2.6 Wi-Fi Protected Access 2WPA 2 implements IEEE 802.11i standards same as the WPA. WPA 2 supports go Encryption Standards as the encryption cipher. This is an encryption standard that implement by US Government. 3 hold of ciphers available in the AES. Those are AES 128, AES 192, and AES 256.In WPA2, Advanc ed Encryption Standards using counter Mode-Cipher Block Channing to provide the high confidentiality to the data. MicrosoftWPA2 architecture must contain following network components to provide better security to the network. An Authentication Server to authenticate the users, Robust Security Network to maintain the pathways of associations, and AES based methodology to provide the privacy, integrity and authentication.The authentication server holds all the user name and passwords of the users of wireless network.When a user wants to connect to a network that uses WPA, The User must provide His / her identical user name and password when the network asks for it. Then the AP sends that informations to the Authentication server to verify the validity of the user to access network resources. Once the authentication server gave a positive feedback, the user allows connecting to the network otherwise the request will be discarded.2.2.6.1 The Four way bowl over ShakeThe Authentication P rocess has 2 Parts, the access point (AP) still needs to authenticate itself to the client station (STA), and keys to encrypt the traffic need to be derived. The earlier EAP exchange has provided the shared secret key PMK (Pair wise Master Key). This key is, however, designed to last the entire session and should be unresolved as little as possible. 1Therefore the four-way tremble is used to establish another key called the PTK (Pairwise perfunctory Key). The PTK is generated by concatenating the following attributes PMK, AP nonce (ANonce), STA nonce (SNonce), AP MAC address, and STA MAC address. The product is then put through a cryptographic hash function. 1The handshake also yields the GTK (Group Temporal Key), used to decrypt multicast and broadcast traffic. The veridical messages exchanged during the handshake are depicted in the figure and explained below 12.2.6.2 Group Key Hand ShakeThe GTK used in the network may need to be updated due to the expiry of a preset timer. Wh en a device leaves the network, the GTK also needs to be updated. This is to prevent the device from receiving any more multicast or broadcast messages from the AP. 2To handle the updating, 802.11i defines a Group Key Handshake that consists of a two-way handshake 2The AP sends the new GTK to each STA in the network. The GTK is encrypted using the KEK assigned to that STA and protects the data from being tampered using a MIC. The STA acknowledges the new GTK and replies to the AP. 22.3 Differences between WEP, WPA and WPA22.3.1 Encryption MethodsWEP uses only one encryption method for the whole network, but in WPA, encryptions are dedicated for every user. One user has its own encryption method.2.3.2 AuthenticationIn WEP Authentication, it uses Open or Shared key authentication method. In WPA operates on Pre-Shared Key Method. As well as WPA uses an authentication server to validate the user and it using EAP to send all the informations to the Server. But WEP does not use any authen tication server.2.3.3 Security Protocols and Key StreamsWEP uses WEP as their Security protocol. This is a primary wireless protocol that has few loop hols for attackers, in WPA use Temporal Key Integrity Management as the security protocol. WPA 2 uses bit advanced security protocol than both of the WEP and WPA. It uses Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP).WPA and WEP both use Rivest Cipher 4 as their cipher, but WPA 2 uses Advanced Encryption Standards. WEP uses 40 and 104 bits key length for the encryption key. WPA use 128 bit for the encryption and 64 bit for the Authentication. WPA2 uses 128 bit key streams for the both Encryption and the authentication.2.3.4 Data Integrity and Key GenerationWEP use Cyclic Redundancy Check 32 bit Method to check the Integrity of the data. WPA use Michael Message Integrity Code to check the integrity of data. WPA2 has CBC-MAC for that operation.WEP does the key generation by using Concatenation. In W PA used Two phase mixing function (both TKIP and RC4). WPA2 doesnt require any key generation.2.4 Security Threats Associated with Wireless NetworksAs Discussed above, nowadays wireless networks become more popular than the wired networks. Many organisations including Commercial Companies, Hospitals, government offices and most of the houses use wireless networks to facilitate different services. But the problem is WLAN are not 100 percent protective from attacks. 802.11x networks are vulnerable to certain attacks. There are thousands of papers and reports available in the internet that describes those kinds of attacks and security threats to WLANs. These security threats mainly target on Confidentiality, Integrity and Network availability.WLAN attacks normally divide in to 2 types. Those are Active Attacks andPassive Attacks. Then those 2 main classes sub divided into types of attacks.2.4.1 Active AttacksActive attacks are the most dangerous attack type. In here, hacker or the unau thorised party gain access to the system and do the modifications to the system or the message transmitting. This end point a receiving an incorrect message stream or a file to the recipient. Active attacks result a loss of integrity of the network. Active attacks are possible to detect by using special software like packet monitors. But the problem associated with this kind of attacks are, its difficult to prevent these kinds of attacks.Active attacks can be sub categorised in to 4 Methods of attacking. Following explain those,2.4.1.1 MasqueradeIn here, Attacker imitates as an authorised user in the network and gains the access to the network. This kind of attacks can be happened in few ways. The first circumstance is authorised user give away the password to an unknown person or a group of people. So automatically they are possible to get access to the system.The other consideration is hacker can use some software pieces to collect the passwords or access keys of authorised user s. There are many methods to perform this kind of attack. Installing Key Board Activities Recording software is a very successful method to collect these kinds of informations.2.4.1.2 ReplyThe Attacker can monitor the transmissions of the source and endpoint machines and re transmit the informations as a legitimate user. So the attackers computer acts as the Source and destination accordingly, to get the actual source and Destinations informations.Reply attacks are offline attacks. The attacker first gathers all the data and then later decrypts that information. This informations could be users authentication session informations that carries WLAN password.2.4.1.3 Message ModificationIn here, attacker tries to metamorphose a particular message or informations. This could results a transmitting wrong informations to the legitimate user.2.4.1.3 Denial of ServiceThis is a very popular attack type and very easily does in a WLAN environment. The main goal of this attack is make the net work unavailable to the users. it generally consists of the concerted efforts of a person or people to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely wiki. This attacks cause Loss of Network a

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.