Cargando…
Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks
This article seeks to provide a snapshot of the security of Wi-Fi access points in the metropolitan area of A Coruña. First, we discuss the options for obtaining a tool that allows the collection and storage of auditable information from Wi-Fi networks, from location to signal strength, security pro...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
PeerJ Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280184/ https://www.ncbi.nlm.nih.gov/pubmed/37346318 http://dx.doi.org/10.7717/peerj-cs.1185 |
_version_ | 1785060747343036416 |
---|---|
author | Carballal, Adrian Galego-Carro, J. Pablo Rodriguez-Fernandez, Nereida Fernandez-Lozano, Carlos |
author_facet | Carballal, Adrian Galego-Carro, J. Pablo Rodriguez-Fernandez, Nereida Fernandez-Lozano, Carlos |
author_sort | Carballal, Adrian |
collection | PubMed |
description | This article seeks to provide a snapshot of the security of Wi-Fi access points in the metropolitan area of A Coruña. First, we discuss the options for obtaining a tool that allows the collection and storage of auditable information from Wi-Fi networks, from location to signal strength, security protocol or the list of connected clients. Subsequently, an analysis is carried out aimed at identifying password patterns in Wi-Fi networks with WEP, WPA and WPA2 security protocols. For this purpose, a password recovery tool called Hashcat was used to execute dictionary or brute force attacks, among others, with various word collections. The coverage of the access points in which passwords were decrypted is displayed on a heat map that represents various levels of signal quality depending on the signal strength. From the handshakes obtained, and by means of brute force, we will try to crack as many passwords as possible in order to create a targeted and contextualized dictionary both by geographical location and by the nature of the owner of the access point. Finally, we will propose a contextualized grammar that minimizes the size of the dictionary with respect to the most used ones and unifies the decryption capacity of the combination of all of them. |
format | Online Article Text |
id | pubmed-10280184 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | PeerJ Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-102801842023-06-21 Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks Carballal, Adrian Galego-Carro, J. Pablo Rodriguez-Fernandez, Nereida Fernandez-Lozano, Carlos PeerJ Comput Sci Computer Networks and Communications This article seeks to provide a snapshot of the security of Wi-Fi access points in the metropolitan area of A Coruña. First, we discuss the options for obtaining a tool that allows the collection and storage of auditable information from Wi-Fi networks, from location to signal strength, security protocol or the list of connected clients. Subsequently, an analysis is carried out aimed at identifying password patterns in Wi-Fi networks with WEP, WPA and WPA2 security protocols. For this purpose, a password recovery tool called Hashcat was used to execute dictionary or brute force attacks, among others, with various word collections. The coverage of the access points in which passwords were decrypted is displayed on a heat map that represents various levels of signal quality depending on the signal strength. From the handshakes obtained, and by means of brute force, we will try to crack as many passwords as possible in order to create a targeted and contextualized dictionary both by geographical location and by the nature of the owner of the access point. Finally, we will propose a contextualized grammar that minimizes the size of the dictionary with respect to the most used ones and unifies the decryption capacity of the combination of all of them. PeerJ Inc. 2022-12-16 /pmc/articles/PMC10280184/ /pubmed/37346318 http://dx.doi.org/10.7717/peerj-cs.1185 Text en © 2022 Carballal et al. https://creativecommons.org/licenses/by/4.0/This is an open access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
spellingShingle | Computer Networks and Communications Carballal, Adrian Galego-Carro, J. Pablo Rodriguez-Fernandez, Nereida Fernandez-Lozano, Carlos Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks |
title | Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks |
title_full | Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks |
title_fullStr | Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks |
title_full_unstemmed | Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks |
title_short | Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks |
title_sort | wi-fi handshake: analysis of password patterns in wi-fi networks |
topic | Computer Networks and Communications |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10280184/ https://www.ncbi.nlm.nih.gov/pubmed/37346318 http://dx.doi.org/10.7717/peerj-cs.1185 |
work_keys_str_mv | AT carballaladrian wifihandshakeanalysisofpasswordpatternsinwifinetworks AT galegocarrojpablo wifihandshakeanalysisofpasswordpatternsinwifinetworks AT rodriguezfernandeznereida wifihandshakeanalysisofpasswordpatternsinwifinetworks AT fernandezlozanocarlos wifihandshakeanalysisofpasswordpatternsinwifinetworks |