Gromov Yu.Yu., Karasev P.I., Artemova S.V., Kibets N.S.
The paper considers the main attacks on wireless Wi-Fi networks. When describing each of them, the causes of vulnerabilities
that led to the possibility of compromising the network by an attacker were considered, as well as possible ways to fi x them.
First of all, information about these security fl aws is presented for review, because in order to understand how to secure your
wireless network, fi rst you need to fi nd out what vulnerabilities exist and how to protect yourself from them. In addition, the
article examined the role of the wireless network in the overall security model of the local network.
Keywords: Wi-Fi, Traffi c interception, IBM, SSID, WPA-2, WEP, Handshake, PNL, WPA/WPA2-Personal (PSK), WPA/
WPA2-Corporate (MGT), Man-in-the-Middle, WPS, Brute force, WPS Pixie Dust, PSK, MAC Address.
DOI: 10.25791/asu.11.2023.1472
Pp. 40-47. |