![]() WEP uses a symmetric stream cipher algorithm called RC4. ![]() WEP CrackingĪs with any encryption, it needs keys for encrypting data. There are mainly two major types of security at this layer. Authentication provides Wi-Fi connectivity to only authorized users. By encryption, It turns clear text data into secret code. The security at this layer is two-fold, authenticating the users and encrypting the data at this layer. Layers providing Wireless connectivityĪccess points are network devices working at Ethernet layer in the OSI stack. I have also provided an example of a UPnP exploit at the end of the paper. This research tries to dissect the devices that provide connectivity into layers and with examples provides a brief description of each layer and security flaws associated with it. This paper outlines the security vulnerabilities, Attack vectors and Attack surfaces of everyday used wireless network devices, especially Wireless Access points and routers that allow Wi-Fi compliant device to connect to a wired network. ![]() Given the wide usage and minimal knowledge of these devices among the users, it is increasingly becoming a target for attackers. Today every house and almost every public area are provided with wireless connectivity constituting of millions of wireless access points and routers throughout the world. "Securing the Wi-Fi Access Points/Routers from malware."
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |