Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools
1 recurso en línea (páginas 73-80).
Main Authors: | , , |
---|---|
Format: | Artículo de revista |
Language: | eng |
Published: |
Universidad Pedagógica y Tecnológica de Colombia
2018
|
Subjects: | |
Online Access: | http://repositorio.uptc.edu.co/handle/001/2163 |
_version_ | 1801705881394479104 |
---|---|
author | Acosta López, Alberto Melo Monroy, Elver Yesid Linares Murcia, Pablo Andrés |
author_facet | Acosta López, Alberto Melo Monroy, Elver Yesid Linares Murcia, Pablo Andrés |
author_sort | Acosta López, Alberto |
collection | DSpace |
description | 1 recurso en línea (páginas 73-80). |
format | Artículo de revista |
id | repositorio.uptc.edu.co-001-2163 |
institution | Repositorio Institucional UPTC |
language | eng |
publishDate | 2018 |
publisher | Universidad Pedagógica y Tecnológica de Colombia |
record_format | dspace |
spelling | repositorio.uptc.edu.co-001-21632021-02-10T18:57:08Z Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools Evaluación de seguridad en protocolo de red inalámbrico WPA2-PSK usando las herramientas Linset y Aircrack-ng Avaliação de segurança em protocolo de rede sem fio WPA2-PSK usando as ferramentas Linset e Aircrack-ng Acosta López, Alberto Melo Monroy, Elver Yesid Linares Murcia, Pablo Andrés Information security Data transmission systems Data security Intrusion detection Wireless security 1 recurso en línea (páginas 73-80). Devido ao surgimento de novas técnicas e tecnologias de intrusão, os protocolos de redes sem fio ficam obsoletas; para isso, busca-se vulnerar a segurança do protocolo WPA2, que é amplamente usado pelos provedores de serviços colombianos. Na primeira parte, o artigo faz uma introdução do protocolo WPA2, descrevendo seu funcionamento e os ataques dos quais pode ser objeto; na segunda parte mostra-se a metodologia que se usou para recolher provas e realizar a avaliação necessária para a elaboração deste documento. Apresentam-se as ferramentas para auditoria das redes sem fio Linset e Aircrack-ng, as quais foram selecionadas para a avaliação de segurança do protocolo. Finalmente, mostram-se os resultados e as conclusões. Due to the emergence of new techniques and technologies of intrusion, the wireless network protocols have become obsolete; for this reason, this research seeks to violate and evaluate the security of the WPA2 protocol that is widely used by the Colombian service providers. The first section of this paper introduces the WPA2 protocol by describing its operation and the potential attacks it may suffer; the second part details the methodology used to collect the tests data and to carry out the evaluation necessary for the preparation of this article. In addition, we present the Linset and Aircrack-ng tools for auditing wireless networks that were selected to assess the security of the protocol. Finally, we show the results and conclusions. Debido al surgimiento de nuevas técnicas y tecnologías de intrusión, los protocolos de redes inalámbricas quedan obsoletos; para ello se busca vulnerar la seguridad del protocolo WPA2, que es ampliamente usado por los proveedores de servicios colombianos. En la primera parte, el artículo hace una introducción del protocolo WPA2, describiendo su funcionamiento y los ataques de los cuales puede ser objeto; en la segunda parte se muestra la metodología que se usó para recolectar pruebas y realizar la evaluación necesaria para la elaboración de este documento. Se presentan las herramientas para auditoría de las redes inalámbricas Linset y Aircrack-ng, las cuales fueron seleccionadas para la evaluación de seguridad del protocolo. Finalmente, se muestran los resultados y las conclusiones. Bibliografía y webgrafía: páginas 79-80. 2018-09-07T20:30:39Z 2018-09-07T20:30:39Z 2018-01-15 Artículo de revista http://purl.org/coar/resource_type/c_6501 info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion Text https://purl.org/redcol/resource_type/ART http://purl.org/coar/version/c_970fb48d4fbd8a85 Acosta López, A., Melo Monroy, E. Y. & Linares Murcia, P. A. (2018). Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools. Revista Facultad de Ingeniería, 27(47), 73-80. https://doi.org/10.19053/01211129.v27.n47.2018.7748. http://repositorio.uptc.edu.co/handle/001/2163. 2357-5328 http://repositorio.uptc.edu.co/handle/001/2163 10.19053/01211129.v27.n47.2018.7748 eng D. Lemos, “El secreto en la nube,” [Online]. Available: http://www.digiware.net/?q=es/blog/elsecreto- de-la-nube [Accessed Apr. 30, 2017]. R. Juan, “Redes inalámbricas Principales protocolos,” 2011. [Online]. Available: http://deredes.net/redesinalambricas- principales-protocolos/ [Accessed Apr. 28, 2017]. A. Hassan Adnan, “A comparative study of WLAN security protocols: WPA, WPA2,” in International Conference on advances in Eletronical Engineering (IEEE), Dhaka, Bangladesh, 2015. Intel, “Wi-Fi diferentes protocolos y velocidades de datos,” 2017. [Online] Aviable: http://www.intel. la/content/www/xl/es/support/articles/000005725/ network-and-i-o/wireless-networking.html [Accessed May. 20 2017]. IEEE “802.11-2016 - IEEE Standard for information technology,” 2016. [Online]. Available: http:// ieeexplore.ieee.org/document/7786995/ [Accessed May 21, 2017]. J. Ruz Maluenda, B. Riveros Vasquez, and A. Varas Escobar, “Redes WPA/WPA2,” [Online] Available: http://profesores.elo.utfsm.cl/~agv/elo322/1s12/ project/reports/RuzRiverosVaras.pdf [Accessed May. 20, 2017]. Ciberseguridad wikia, “Ataques TCP/IP,” 2013. [Online] Available: http://es.ciberseguridad.wikia. com/wiki/Ataques_TCP/IP [Accessed May. 24, 2017]. S. Dietrich, D. Dittrich, and P. Reiher. Denial of Service. Attack and Defense Mechanisms. NJ: Prentice Hall. 2004. Wifislax “Presentación,” [Online] Available: http:// www.wifislax.com [Accessed Jun. 4, 2017]. A. Maroto, “Crackeando Redes Wi-Fi: WPA y WPA2 –PSK,” 2016 [Online] Available: http://www.tic.udc. es/~nino/blog/lsi/reports/wpa.pdf [Accessed Jan. 20, 2017]. Aircrack-ng, “Introduction,” [Online] Available: http://www.aircrack-ng.org/doku.php [Accessed Mar. 27, 2017]. VMware, “Workstation pro,” [Online] Available: http://www.vmware.com/co/products/workstation. html [Accessed Mar, 30 2017]. Revista Facultad de Ingeniería;Volumen 27, número 47 (Enero-Abril 2018) Copyright (c) 2018 Universidad Pedagógica y Tecnológica de Colombia https://creativecommons.org/licenses/by-nc/4.0/ info:eu-repo/semantics/openAccess Atribución-NoComercial 4.0 Internacional (CC BY-NC 4.0) http://purl.org/coar/access_right/c_abf2 application/pdf application/pdf Universidad Pedagógica y Tecnológica de Colombia https://revistas.uptc.edu.co/index.php/ingenieria/article/view/7748/6138 |
spellingShingle | Information security Data transmission systems Data security Intrusion detection Wireless security Acosta López, Alberto Melo Monroy, Elver Yesid Linares Murcia, Pablo Andrés Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title | Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_full | Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_fullStr | Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_full_unstemmed | Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_short | Evaluation of the WPA2-PSK wireless network security protocol using the Linset and Aircrack-ng tools |
title_sort | evaluation of the wpa2 psk wireless network security protocol using the linset and aircrack ng tools |
topic | Information security Data transmission systems Data security Intrusion detection Wireless security |
url | http://repositorio.uptc.edu.co/handle/001/2163 |
work_keys_str_mv | AT acostalopezalberto evaluationofthewpa2pskwirelessnetworksecurityprotocolusingthelinsetandaircrackngtools AT melomonroyelveryesid evaluationofthewpa2pskwirelessnetworksecurityprotocolusingthelinsetandaircrackngtools AT linaresmurciapabloandres evaluationofthewpa2pskwirelessnetworksecurityprotocolusingthelinsetandaircrackngtools AT acostalopezalberto evaluaciondeseguridadenprotocoloderedinalambricowpa2pskusandolasherramientaslinsetyaircrackng AT melomonroyelveryesid evaluaciondeseguridadenprotocoloderedinalambricowpa2pskusandolasherramientaslinsetyaircrackng AT linaresmurciapabloandres evaluaciondeseguridadenprotocoloderedinalambricowpa2pskusandolasherramientaslinsetyaircrackng AT acostalopezalberto avaliacaodesegurancaemprotocoloderedesemfiowpa2pskusandoasferramentaslinseteaircrackng AT melomonroyelveryesid avaliacaodesegurancaemprotocoloderedesemfiowpa2pskusandoasferramentaslinseteaircrackng AT linaresmurciapabloandres avaliacaodesegurancaemprotocoloderedesemfiowpa2pskusandoasferramentaslinseteaircrackng |