Skip navigation
  •  Inicio
  • UDC 
    • Cómo depositar
    • Políticas do RUC
    • FAQ
    • Dereitos de Autor
    • Máis información en INFOguías UDC
  • Percorrer 
    • Comunidades
    • Buscar por:
    • Data de publicación
    • Autor
    • Título
    • Materia
  • Axuda
    • español
    • Gallegan
    • English
  • Acceder
  •  Galego 
    • Español
    • Galego
    • English
  
Ver ítem 
  •   RUC
  • Facultade de Informática
  • Investigación (FIC)
  • Ver ítem
  •   RUC
  • Facultade de Informática
  • Investigación (FIC)
  • Ver ítem
JavaScript is disabled for your browser. Some features of this site may not work without it.

Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks

Thumbnail
Ver/abrir
Carballal_Sergio_2022_Wi-Fi_Handshak_analysis_password_patterns_Wi-Fi_networks.pdf (8.414Mb)
Use este enlace para citar
http://hdl.handle.net/2183/32723
Atribución 4.0 International (CC BY 4.0)
A non ser que se indique outra cousa, a licenza do ítem descríbese como Atribución 4.0 International (CC BY 4.0)
Coleccións
  • Investigación (FIC) [1728]
Metadatos
Mostrar o rexistro completo do ítem
Título
Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks
Autor(es)
Carballal, Adrián
Galego Carro, José Pablo
Rodríguez-Fernández, Nereida
Fernández-Lozano, Carlos
Data
2022
Cita bibliográfica
Carballal A, Galego-Carro JP, Rodriguez-Fernandez N, Fernandez-Lozano C. 2022. Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks. PeerJ Computer Science 8:e1185. Disponible: https://doi.org/10.7717/peerj-cs.1185
Resumo
[Abstract]: This article seeks to provide a snapshot of the security of Wi-Fi access points in the metropolitan area of A Coruña. First, we discuss the options for obtaining a tool that allows the collection and storage of auditable information from Wi-Fi networks, from location to signal strength, security protocol or the list of connected clients. Subsequently, an analysis is carried out aimed at identifying password patterns in Wi-Fi networks with WEP, WPA and WPA2 security protocols. For this purpose, a password recovery tool called Hashcat was used to execute dictionary or brute force attacks, among others, with various word collections. The coverage of the access points in which passwords were decrypted is displayed on a heat map that represents various levels of signal quality depending on the signal strength. From the handshakes obtained, and by means of brute force, we will try to crack as many passwords as possible in order to create a targeted and contextualized dictionary both by geographical location and by the nature of the owner of the access point. Finally, we will propose a contextualized grammar that minimizes the size of the dictionary with respect to the most used ones and unifies the decryption capacity of the combination of all of them.
Palabras chave
WPA
WPA2
Wi-Fi security
Password cracking
Hashcat
 
Descrición
This work is supported by the General Directorate of Culture, Education and University Management of Xunta de Galicia (Ref. ED431G/01, ED431D 2017/16), the Galician Network for Colorectal Cancer Research (Ref. ED431D 2017/23), Competitive Reference Groups (Ref. ED431C 2018/49) and the Spanish Ministry of Economy and Competitiveness via funding of the unique installation BIOCAI (UNLC08-1E-002, UNLC13-13-3503) and the European Regional Development Funds (FEDER). The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Versión do editor
http://dx.doi.org/10.7717/peerj-cs.1185
Dereitos
Atribución 4.0 International (CC BY 4.0)

Listar

Todo RUCComunidades e colecciónsPor data de publicaciónAutoresTítulosMateriasGrupo de InvestigaciónTitulaciónEsta colecciónPor data de publicaciónAutoresTítulosMateriasGrupo de InvestigaciónTitulación

A miña conta

AccederRexistro

Estatísticas

Ver Estatísticas de uso
Sherpa
OpenArchives
OAIster
Scholar Google
UNIVERSIDADE DA CORUÑA. Servizo de Biblioteca.    DSpace Software Copyright © 2002-2013 Duraspace - Suxestións