Библиографическое описание:

Тожахмедова И. Г. Ensuring hack wireless networks // Молодой ученый. — 2016. — №2. — С. 110-113.


This paper deals with methods and motivations of hacking the wireless network, the most pressing at the moment.


One of the most urgent tasks today is the protection of information in wireless networks. Most wireless networks only protect the resources of the router. He is the initial stage of the security measures, separating the local network from the global. One of the simplest ways to protect wireless network invisible and put a password. But with all this, it can not guarantee complete security when connecting to the network. However, you can take certain measures that will make for an intruder to access the data more difficult.

In order to effectively protect the wireless network, you need to find out how we can crack it.

Let us examine what the motivation may serve to hack your network.

  1.              Free Internet. Despite the fact that now the ISPs offer enough affordable rates, available in almost all the attacker may want to keep in reserve a spare channel around the clock in case your internet is suddenly not available.
  2.              Listening to the interception of traffic and the subsequent break-mail accounts, social networks, and other illegal actions. Having the password for Wi-Fi attacker has the ability to decode all transmitted «over the air» traffic, including the authentication session on different sites, cookies and so on.
  3.              Industrial espionage. Currently, the office Wi-Fi, a quick set up by incompetent administrators is for an attacker to «open the door» in the corporate LAN. As a result, you can gain access to confidential information as a company as well as to personal data of employees.
  4.              Pentesting (from Eng. Penetration testing — penetration testing). Pentestery — is essentially the same hackers, but acting on the request and with the consent of the owner of the network. Their task is to check the network security and resistance to penetration from the outside (or violation of its work from the inside). Among the owners of large and medium-sized businesses, IT-baffled security structures of their businesses, the demand for such services is very high.
  5.              Curiosity. It is a fairly common reason for breaking the network. This cause is particularly prevalent among the younger generation, being a kind of method of expression and giving a reason for pride.

Let us consider several methods of hacking the wireless network.

MAC Sniffing & Spoofing — an attack of this kind are possible because the transmission of packets even when the WEP, MAC-address is sent over the network in clear text. As a result, MAC-address can be caught. Further inquiries are formed attacker access point using forged MAC.

WEP Attacks — pure data integrity tested and issued checksum (integrity check value, ICV). In 802.11 it uses CRC-32. ICV is appended to the data. Generates 24-bit initialization vector (IV) and to it «attaches» the secret key. The resulting value is the source for the generation of pseudo-random numbers. The generator produces a key sequence. Data XOR-yatsya this key sequence. The initialization vector is added to the end of all of it is transferred to the air.

Access Point Spoofing — This type of attack involves the use of fake access point, luring customers themselves. As a consequence, passwords and all data are at the attacker. The only condition for the successful implementation of this attack — burglar alarm access point must be commensurate stronger legal AP.

Plain text-attack. Enabled by the attacker knows the original message and has a copy of the encrypted response. All that is necessary in this case — the key. To obtain an attacker sends a network of some of the data and receives a response. On the basis of the response is 24-bit initialization vector used to generate a key.

Attack KoreK — in 2004 was offered a hacker calling himself KoreK. Its peculiarity is that the attack does not require weak initialization vector. To break is necessary to intercept the hundreds of thousands of staff. In the analysis using only the initialization vectors.

Attack Thews-Weinmann-Pyshkina — it was proposed in 2007 by Erik Thews (Erik Tews), Ralf-Phillip Weinmann (Ralf-Philipp Weinmann) and Andrei Pyshkina. It uses the opportunity injection ARPzaprosov the wireless network. At the moment this is the most effective attack to hack requires only a few tens of thousands of staff. The analysis uses the entire frame.

Attack Fluhrer-Mantin-Shamir. Employees Cisco Scott Fluhrer, Itsik Mantin, and Adi Shamir of Israel Research Institute have discovered a critical vulnerability in the algorithm Key Scheduling Algorithm (KSA), which stands at the heart of RC4. With it you can get a 24-bit WEP, and even a 128-bit key WEP 2. The result of the research — two programs: Air snort and WEPCrack, in certain circles, is particularly popular. To carry out the attack need at least half a million packages. After updating the protocol the attack failed.

Denial of service (DDoS) attacks — the goal of any denial of service attack is to limit access to legitimate user to network resources, which is provided by sending a huge number of malformed packets, flooding the legitimate traffic and causing freeze and / or system reboot.

Low Hanging Fruit — this type of attack is designed for extraction of resources from the vulnerable unprotected networks. Most wireless networks are absolutely unprotected, they do not require authorization, and do not even use WEP, because a person with a wireless network card and a scanner can easily connect to the Access Point-have and use all the resources available to them. Hence the name — low-hanging fruit that frustrate there is no difficulty.

Rapid development of wireless technology in our country make the problem of searching for methods and means of protection against unauthorized access to the network is sufficiently urgent for both large companies and corporations that use their offices wireless networks and home users who want to ensure the safety of their information resources. To date, access to the Internet through wireless technologies provide such ISPs like TPS, EVO, SOHO, and others. In this regard, we can say, the number of attacks on wireless networks, which entails the need for additional security measures.




  1.              Agzamov A., Anvarov A., Shakirov K. Economic reform and investment priorities in the Republic of Uzbekistan //Comparative Economic Studies. — 1995. — Т. 37. — №. 3. — С. 27–38.
  2.              Анваров А. А., Каримов П., Негматов У. М. АЛГОРИТМЫ НОРМАЛИЗАЦИИ ОСВЕЩЕННОСТИ ИЗОБРАЖЕНИЯ //Украина,Актуальные научные исследования в современном мире: материалы V Междунар.научн.-практ. инт.-конф. — Переяслав-Хмельницкий., Украина, 2015. — Т. 5. — №. Актуальныенаучныеисследованияв соврем. — С. 118–123.
  3.              Anvarov A. Learning Resources and Professional Development at Namangan Engineering Pedagogical Institute //YoungScientistUSA. — 2015. — Т. 3. — №. ISBN 978–1-329–40658–2. — С. 54–56.
  4.              Anvarov, Alisher. «Methods for Effective education». Scientific Journal Yan Kochanovski University, Poland 3.4 (2015): 4.
  5.              Анваров A. Staff development aspects of Namangan engineering pedagogical institute //«Молодойученый». — 2015. — Т. 12. — №. № 12 (92) / 2015 ISSN 2072–0297. — С. 705–707.
  6.              Anvarov A., Tojaxmedova I., Azimova D. System of Assessment in Namangan Engineering Pedagogical Institute //YOUNG SCIENTIST USA. — 2015. — С. 51.
  7.              Anvarov A. Recommendations on self-cognition and self development for ensuring spiritual development of students University //Austrian Journal of Humanities and Social Sciences 2015 January-February. — 2015. — Т. 1. — №. 1–2. — С. 74–75.
  8.              Anvarov A. Role of the international cooperation in high education development //Austrian Journal of Humanities and Social Sciences. — 2015. — Т. 1. — №. № 1–2 2015. — С. 72–74.
  9.              Agzamov A., Anvarov A., Shakirov K. Economic reform and investment priorities in the Republic of Uzbekistan //Comparative Economic Studies. — 1995. — Т. 37. — №. 3. — С. 27–38.
  10.         ANVAROV A. CREATION OF EDUCATION NETWORK AMONG THE INSTITUTIONS OF THE FERGHANA VALLEY //CHINA SHANGHAI university scientific journal. — 2005. — Т. 1. — №. 10. — С. pages 37–38.
Основные термины: wireless network, initialization vector, 24-bit initialization vector, wireless networks, access point, attack, attacker access point, 128-bit key WEP, weak initialization vector, wireless network card, Access Point Spoofing, offices wireless networks, fake access point, alarm access point, Attack KoreK, security measures, pure data integrity, vulnerable unprotected networks, integrity check value, Attack Fluhrer-Mantin-Shamir


Социальные комментарии Cackle