Kissi 2020 Ijca 920365
Kissi 2020 Ijca 920365
net/publication/342283555
CITATIONS READS
18 8,203
2 authors:
All content following this page was uploaded by Michael Kyei Kissi on 10 July 2020.
ABSTRACT standards. The 802 handles the Local and Metropolitan Area
The use of wireless network as a medium of communication Network (MAN) whilst the suffix .11 handles the WLAN [3].
has tremendously increased due to its flexibility, mobility and The 802.11 is governed by set of rules or protocols to aid
easy accessibility. Its usage is inevitable at hotels and propagation of wireless signals and communication across the
restaurants, airports, organizations and currently predominant wireless network. The 802.11 employs the Carrier Sense
in homes. As large number of devices connect to wireless Multiple Access (CSMA) and the Medium Access Control
network, valuable and sensitive information are shared among (MAC) protocol with Collision Avoidance (CA). There are
users in the open air, attackers can easily sniff and capture versions of the standard which can be recognized by one or
data packets. This paper aims at using penetration testing to two ending alphabetic characters, these are 802.11a, 802.11b,
assess vulnerabilities and conduct attacks on Wireless 802.11g, 802.11n and 802.11ac [8]. The most common and
Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) widely used among the standard are the 802.11a, 802.11b and
and 802.11i (WPA2) security protocols. The penetration 802.11g [7].
testing was conducted using Kali Linux with its Aircrack-ng
tools.
2.1 Attacks on WLAN
WLAN uses Radio Frequency (RF) or Infrared Transmission
Keywords Technology for connectivity among devices making it
IEEE, 802.11, WEP, WPA, WPA2, Kali Linux, Aircrack-ng, susceptible to attacks. Attacks on wireless network aims at
WLAN, Wireless, Penetration Testing, Encryption, Security. breaching the integrity and confidentiality of the network
availability and needed information. These attacks are
1. INTRODUCTION categorized into Passive and Active Attacks.
Wireless Network in today’s communication technology is Passive attack: Network traffics are silently eavesdropped or
tremendously increasing due to the benefits it provides such monitored by an attacker and waits until a client seeks to
as flexibility, mobility and easier accessibility. Most hotels connect with the Access Point (AP) or searches for the
and restaurants, coffee shops, airports, organizations and network Service Set Identifier (SSID) as a result the attacker
institutions currently provide open or secured wireless obtains the SSID in plaintext. An attacker can intercept data
connectivity. Nevertheless, wireless network can also be seen transmitted through the network such as Traffic Analysis,
in homes [1]. The IEEE 802.11 Wireless Local Area Network Packet Sniffing, War-Driving and Port Scanning. These types
(WLAN) has evolved to be the easiest and known network of attacks are usually difficult to detect since the attacker does
technology to setup since its inception. Its popularity is as not modify the content or information [9].
result of the use of a Local Area Network (LAN), less
expensive, easy setup installation and configuration Active attack: The attacker does not only gain access to
procedures [2]. The availability of WLAN menaces the information but can make changes to the network information
security of the Network Infrastructure causing challenges for and even inject fraudulent packets to the network. An attacker
Network Administrators as well as the organization. WLAN can initiate commands to disrupt the usual operations of the
signal travels beyond the boundaries of a specified area as network such as Denial of Service (DoS), Session Hijacking,
compared to wired network [3]. [4] noted that the use of the Brute force Attack, Reply Attack, and Man in the Middle
wireless medium is shared among its users in the open air; (MITM) attack [9] [10].
attackers can easily sniff and capture data packets. WLAN
may suffer attacks and damages such as system comprised, 2.2 WLAN Security
data theft, Denial of Service (DoS) and among others [5]. This The WLAN protocols outlined by the IEEE comprise of three
study presents a security assessment of WLAN using security standards, these are Wired Equivalent Privacy
penetration testing tools to examine and exploit identified (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected
vulnerabilities in WLAN security protocols. Penetration Access 2 (WPA2) [11]. [12] stated that WLAN security
testing framework used for the testing was based on the protocols were designed to protect the network from several
National Institute of Standards and Technology (NIST) [6]. breaches due to susceptibility of the Wi-Fi transmission
The framework involves four phases namely; Planning Phase, signals which has no limited boundaries, hence, they are
Discovery Phase, Attack Phase and Reporting Phase. prone to illegitimate access. According to [13] a secured
WLAN must have five key requirements, namely;
2. LITERATURE REVIEW Authentication, Access Control, Confidentiality, Non-
The IEEE 802.11 gives a criterion for WLAN Repudiation and Data Integrity. In spite of this WLAN
communications among devices [7]. The IEEE in 1997 security are prone to threats such as Eavesdropping and traffic
developed the 802.11 standard which is a subset of the 802 analysis, Denial of Service, Masquerade, forged packets and
26
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
27
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
28
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
29
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
4. RESULTS ANALYSIS
Vulnerabilities discovered enabled a successful crack of the
wireless security protocols.
Figure 11: WEP Key Successfully Cracked
30
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
31
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
5. CONCLUSION
In assessing the security of IEEE 802.11 WLAN Security
protocols using penetration testing, it is proven that WEP and
WPA/WPA2-PSK are vulnerable to attacks. In WEP, the
entire size of the IV space is 24-bit which gets exhausted
within a short time and cause the IVs to repeat itself as more
Figure 19: First Message of the WPA Four-way packets are being generated. Cracking of WEP Key is
Handshake (ANonce and AP MAC Address) dependent on the generating of more weak IVs. Once enough
weak IVs are generated the key will be successfully cracked.
The Supplicant sends the second message as a reply to the
The CRC32 checksum (ICV) aim is to verify data integrity by
first EAPOL Handshake message by sending its SNonce in preventing alter of data packets in transit. The ICV is related
plain text to the Authenticator encrypted by a cryptographic
to the plaintext not to the cipher text. Fake cipher text
hash algorithm (HMAC-SHA1) called the MIC for integrity
generated does not affect the ICV, therefore, the ICV unable
of the installed key on the supplicant side as highlighted in
to achieve its aim. In the case of WPA/WPA2-PSK, the four-
figure 20. An MIC is computed for each PTK by the AP and
way handshake between the client and the AP is easy to be
compared with the captured MIC in the second message of the
captured by an attacker and determine the PMK and PTK
EAPOL Handshake. If they are equal, the attacker derives
since it is dependent on the captured of the four-way
same PTK and the passphrase is cracked.
handshake. WPA/WPA2-PSK will be successfully cracked if
only the passphrase exists in the attacker’s wordlist or
dictionary file since the PMK and PTK can be determined.
6. REFERENCES
[1] Lee P., Stewart D. and Calugar-Pop C., (2014).
Technology, Media & Telecommunications Predictions.
London: Deloitte report, pp. 1-60, 2014.
[2] Waliullah Md., Moniruzzaman A. B. M., and Sadekur
Rahman Md., (2015). An Experimental Study Analysis
of Security Attacks at IEEE 802.11 Wireless Local Area
Network. International Journal of Future Generation
Communication and Networking, vol. 10, no. 4, pp. 9-18.
[3] Ola G., (2013). Penetration Testing on a Wireless
Network Using Backtrack 5. Turku University of
Applied Sciences.
[4] Chen Z., Guo S., Zheng K., and Li H., (2009). Research
on man-in-the-middle denial of service attack in sip
Figure 20: Second Message of the WPA Four-way VoIP," Networks Security, Wireless Communications
Handshake (SNonce, MIC and Client MAC Address) and Trusted Computing, NSWCTC, vol. 2, pp. 263-266,
The Passphrase of the WPA/WPA2-PSK was successfully Apr. 2009.
obtained as shown in figure 21 indicating the PMK, PTK and [5] Appiah, J. K., (2014). Network and Systems Security
the MIC using cryptographic hash algorithm (HMAC-SHA1). Assessment using penetration testing in a university
The outcome of this study implies that WPA/WPA2-PSK is environment: The case of Central University College.
vulnerable to dictionary attack. Attacker can crack Kwame Nkrumah University of Science and Technology,
WPA/WPA2-PSK if the passphrase exists in dictionary or Kumasi.
wordlist. [6] National Institute of Standards and Technology (NIST),
(2008). Technical Guide to Information Security Testing
and Assessment, Special Publication 800-115,
Gaithersburg.
32
International Journal of Computer Applications (0975 – 8887)
Volume 176 – No. 32, June 2020
[7] Praveen L., Ravi S. Y., and Keshava R. M. (2011). Bio-Inspired Network. Liverpool John Moores
Securing IEEE 802.11g WLAN Using OPENVPN and University.
Its Impact Analysis. International Journal of Network
Security & Its Applications (IJNSA), Vol.3, No.6, [23] Kurup L., Shah V. and Shah D., (2014). Comparative
November 2011. Study of Attacks on Security Protocols. International
Journal of Advanced Research in Computer Engineering
[8] Kropeit T. (2015), Don’t Trust Open Hotspots: Wi-Fi & Technology (IJARCET) Volume 3 Issue 8, August
Hacker Detection and Privacy Protection via 2014
Smartphone. Ruhr-Universitat Bochum.
[24] Fluhrer S., Mantin I. and Shamir A., (2001). Weaknesses
[9] Forouzan B., (2008). Data Communications & in the Key Scheduling Algorithm of RC4. Eighth Annual
Networking. 4th edition. New York: McGraw-Hil Workshop on Selected Areas in Cryptography, August
2001.
[10] L’ubomir Z., (2012). Security of Wi-Fi Networks.
Comenius University, Bratislava [25] Hulin K., Locke C., Mealey P., and Pham A., (2010).
“Analysis of wireless security vulnerabilities, attacks,
[11] Bilger J., Cosand H., Singh N. and Xavier J. (2005). and methods of protection”. Information Security
Security and Legal Implications of Wireless Networks, Semester Project, 2010.
Protocols, and Devices
[26] [Robyns P., (2014). Wireless Network Privacy. Hasselt
[12] Shweta T., Pratim K., Sumedh K, and Aniket G., (2013). University
“Study of Vulnerabilities of Wlan Security Protocols,”
Journal, Dep. Comput. Eng. Fr. C. Rodrigues Inst. [27] Zarch S. H. M., Jalilzadeh F., and Yazdanivaghef M.,
Technol. Vashi, Navi Mumbai, no. September, pp. 109– (2012). Encryption as an Impressive Instrumentation in
112, 2013 Decrease Wireless WAN Vulnerabilities. International
Journal of Scientific and Research Publications, Volume
[13] Memon A. Q., Raza A. H. and Iqbal S., (2010). WLAN 2, Issue 12, December 2012, ISSN 2250-3153
Security. Halmstad University School of Information
Science, Computer and Electrical Engineering. Technical [28] Papaleo, G. (2006). Wireless Network Intrusion
report, IDE1013, April 2010. Detection System: Implementation and Architectural
Issues: Universita degli Studi di Genova.
[14] Kumkar V., Tiwari A., Tiwari P., Gupta A. and Shrawne
S., (2012). Vulnerabilities of Wireless Security protocols [29] Ciampa M. D., (2012). Security+ Guide to Network
(WEP and WPA2). International Journal of Advanced Security Fundamentals. Course Technology, Cengage
Research in Computer Engineering & Technology. Learning.
Volume 1, Issue 2, April 2012
[30] Laverty D., (n.d.). WPA versus 802.11i (WPA2): How
[15] Park T., Wang H., Cho M., Shin K. G., (2002). Enhanced your Choice Affects your Wireless Network Security.
Wired Equivalent Privacy for IEEE 802.11 Wireless http://www.openxtra.co.uk/articles/wpa-vs-80211i.php
LANs: The University of Michigan
[31] Mkubulo D., (2007). Analysis of Wi-Fi Security
[16] Intercop Net Labs, (2002). "What's Wrong with WEP?" Protocols and Authentication Delay. The Florida State
Retrieved from University, FAMU-FSU College of Engineering
http://www.opus1.com/www/whitepapers/whatswrongwi
thwep.pdf (Accessed on May 10, 2018) [32] Vanhoef M., and Piessens F., (2017). Key Reinstallation
Attacks: Forcing Nonce Reuse in WPA2. imec-DistriNet,
[17] Borisov N., Goldberg I., and Wagner D., (2001). KU Leuven
Security of the WEP algorithm Retrieved from
http://www.isaac.cs.berkeley.edu/isaac/wep-faq.html [33] Ramachandran, V. (2011), BackTrack 5 Wireless
(Accessed on April 24, 2018) Penetration Testing, Master Bleeding Edge Wireless
Testing Techniques with BackTrack 5: Packt Publishing,
[18] Kiemele L., (2011). Wireless Network Security. Birmingham UK
V00154530
[34] Noh J., Kim J., and Cho S., (2018). Secure
[19] Zahur Y. and Yang T., (2004). “Wireless LAN Security Authentication and Four-Way Handshake Scheme for
and Laboratory Designs”. University of Houston Clear Protected Individual Communication in Public Wi-Fi
Lake CCSC, Journal of Computing Sciences in Colleges, Networks. Digital Object Identifier 10.1109/IEEE
vol. 19, no. 3, January 2004, pp. 44-60. ACCESS.2018.2809614
[20] Bulbul H. I., Batmaz I. and Ozel M., (2008). Wireless [35] Kaplanis C., (2015). Detection and prevention of Man in
Network Security: Comparison of WEP (Wired the Middle attacks in Wi-Fi Technology
Equivalent Privacy) Mechanism, WPA (Wi-Fi Protected
Access) and RSN (Robust Security Network) Security [36] Stimpson T., Liu L., Zhang J., Hill R., Liu W. and Zhan
Protocols. Gazi University Y. (2012). “Assessment of Security and Vulnerability of
Home Wireless Networks”, IEEE 9th International
[21] Gupta S., (2012). Wireless Network Security Protocols- Conference on Fuzzy Systems and Knowledge
A Comparative Study, IJETAE, 2012 Discovery, Chongqing, China, 29-31 May, 2012, pp.
2133-2137.
[22] Alselwi A., (2015). Wireless Security Protocol in DNA
IJCATM : www.ijcaonline.org 33