Penetration Testing of WPA and WPA2 Security Protocols and the Analysis of Security Solutions Cover Image

Penetration Testing of WPA and WPA2 Security Protocols and the Analysis of Security Solutions
Penetration Testing of WPA and WPA2 Security Protocols and the Analysis of Security Solutions

Author(s): Luka Rajn, Nikola Pavlović, Šemsudin Plojović
Subject(s): Micro-Economics, Security and defense, ICT Information and Communications Technologies
Published by: Editura Fundaţiei România de Mâine
Keywords: network security; WPA; WPA2; security protocols; security solutions;

Summary/Abstract: This paper will discuss the security protocols of wireless computer networks. WEP, WPA / WPA2 encryption and the reasons for the existence of such protocols and how they are applied will be explained. The security of WEP and WPA / WPA2 protocols will be tested with practical examples and penetration testing in a secure environment, using Airgeddon and Pixiewps tools. The operating system to be used is ParrotOS.

  • Issue Year: 22/2022
  • Issue No: 1
  • Page Range: 93-110
  • Page Count: 18
  • Language: English