Mobility

WPA Exploitation in the World of Wireless Network

Free registration required

Executive Summary

WiFi device uses security authentication protocol even though they are having some weakness. Generally WEP, WPA protocols are used for security purpose. This is already proved that WEP authentication protocol is a weak protocol. By analyzing weakness of WEP the concept of WPA and WPA2 developed. In this paper, the authors will examine the weaknesses of "Strong WPA/WPA2 Authentication" and see how easy it is to crack the protocol. They will take a look at the new standard's WPA and WPA2 implementations along with their first minor vulnerabilities and how it is possible to crack it.

  • Format: PDF
  • Size: 654.58 KB