Git Product home page Git Product logo

w19048021's Introduction

KF7029 MSC COMPUTER SCIENCE AND DIGITAL TECHNOLOGIES


Project: Security attacks in Wireless Network

Student, tutor, supervisor and marker

Student name : Chaitanya Pavan Supervisor Name : Dr. Xiaomin Chen Second Marker Name : Dr. Kyle Montague

Aim

The main aim of this research is to investigate vulnerability using WPA2 and WPA3 password authentication scheme, perform attacks and check WPA3 is secure than WPA2, and provide mitigation techniques to secure Wireless LAN

Executing steps

STEP-1: Capture Handshake STEP-2: Upload and convert a WPA / WPA2 pcap capture file to a hashcat capture file STEP-3: Use password intelligence using OSINT Framework STEP-4: Perform attacks on handshake file for WPA2 and WPA3 STEP-5: Compare and analyze

Conclusion

Research provided accurate analysis on WPA2 and WPA3 password cracking techniques. Here WPA3 were not able to crack using attack that successfully cracked WPA2. Additionally research enhanced the password cracking process using OSINT (Open Source Intelligence) framework, GPU (Graphical Processing Unit) and HashCat tools. Investigation use Hashcat tool to perform Hybrid attack, combinatory attack, and dictionary attack on handshake file. It is efficient to perform attack for known password patters but kaggle password dataset and OSINT framework can help to increase probability. Research utilized sample list of the 1Lakh passwords and performed attack using various attack mode, mask, and rule used to perform actual password attack. OSINT is huge collection of the related information that improved password attack to increase probability of correct password. It is very important to have efficient password list (wordlist) and password intelligence for the security testing. OSINT framework provides crucial information for highest quality password and related information. Comparatively it is efficient and useful to gain an actual password within in short-time. Investigation improves security skills for network administrators and also makes them proficient for managing effective passwords (secrete key) in wireless networks. Network administrators must use strong authentication keys and WPA3 security mode to reduce the attacks. WEP is outdated and has many security issues as well as WPA/WAP2 has been proven as less secure but still this protocol is widely used in the world. WPA3 is newer technology after WPA2, providing robust security where the client is accessing an open network rather than establishing connection between APs and client. In WPA3 attacker can capture and takeout handshake file but it is very hard to recover or gain actual network access key. WPA3 is designed to solve every security issue associated with the previous standards.

w19048021's People

Contributors

pavanjuluru143 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.