Penetration Testing on WPA2
R.Sam Jasper1, P.P Amritha2, M. Sethumadhavan3
1R Sam Jasper , TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India.
2PP Amritha , TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India.
3M Sethumadhavan , TIFAC-CORE in Cyber Security Amrita School of Engineering, Coimbatore, Amrita Vishwa Vidyapeetham, India.
Manuscript received on March 12, 2020. | Revised Manuscript received on March 25, 2020. | Manuscript published on March 30, 2020. | PP: 3003-3007 | Volume-8 Issue-6, March 2020. | Retrieval Number: F8475038620/2020©BEIESP | DOI: 10.35940/ijrte.F8475.038620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The WLAN devices are used nowadays in many universities, commercial buildings, and organisations which were developed by Wi-Fi alliance to provide interoperability, security and ease of use of wireless devices connected to everywhere, every time to the internet. The WPA2 standard (IEEE 802.11) defines security mechanisms for wireless networks. This paper describes possible attacks launched on Wireless LAN from pre-connection to gaining access to the system and it represents the effect of these attacks on the WLAN along with some mitigations to prevent the devices from the below-defined attacks.
Keywords: WPA2, WLAN Attacks, DOS Attacks, WI-FI Attacks,802.11 MAC Attacks, WPA2 Handshake-Keys.
Scope of the Article: Nondestructive Testing and Evaluation.