Message4: The STA finally sends a confirmation message to the AP. AP also transports the current MIC and Group Transient Key (GTK) to the STA. Message3: The AP receives the information, uses the same method to derive the MIC, and checks the MIC generated by STA. The MIC is used when the AP checks the integrity of this message. In message 2, message integrity check (MIC) is included. The STA derives the Pairwise Transient Key (PTK) using the AP_MAC, the STA_MAC, the SNonce, the ANonce, and the PMK. Message2: Once the STA receives the ANonce, the STA also generates a random value defined as a station nonce (SNonce) and uses the WPA password and the SSID to generate the Pairwise Master Key (PMK). Message1: the AP sends a random value defined as an AP nonce (ANonce) to the STA This method can build a WiFi password security detection experiment that is interactive and close to the actual situation, so as to deepen the understanding of the security vulnerabilities of the wireless network, improve the awareness of prevention, strengthen the defensive system, and do a good job in the corresponding security reinforcement and system improvement in order to avoid the other major losses caused by the system security vulnerabilities. In this paper, aireplay-ng tool group is used to carry out anti-authorization attack on WPA/WPA2 encrypted wireless network to complete the WiFi password cracking. There are tools such as Aireplay-ng, Beini and CoWPAtty for wireless packet capture violence cracking of WPA/WPA2 currently. Using a key dictionary can effectively crack the WiFi password, which is the main means for brute force cracking of wireless password. The WPA/WPA2 further makes up for the shortcomings of the WEP. The WEP is the first-generation encryption protocol with a simple encryption algorithm and low security. The core encryption method has experienced WEP, WPA and WPA2, which have greatly improved the security and password cracking difficulty each time. At present, in terms of wireless network security, encryption is mainly used to protect signals. Combined with penetration testing, it has a significant practical value to comprehensively evaluate WiFi wireless network security. It is well-known that the best form of defence is attack. Penetration testing technology can highly simulate the risks faced by the system, fully explore the potential security vulnerabilities of the system, and reveal the technical defects in the system. How to ensure the safety of wireless networks has become a crucial hotspot, which required further researching. Our privacy will be spied wantonly, and the state security will be threatened. If there is no corresponding prevention and protection, it will face great hidden dangers. In the application and development of wireless networks, any users might be threatened by information leakage, also including government. While wireless networks bring great convenience to our work and life, network security is also facing a very serious practical test. With the accelerated growth of network systems and the complexity of network information, amount of information security problems have increased.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |