EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 11

Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON

journal image
 Download
776
  • Varun Chopra and Sushil Mehra 2014. Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON. International Journal of Applied Information Systems. 7, 11 (November 2014), 51-55. DOI=http://dx.doi.org/10.5120/ijais451262
  • @article{10.5120/ijais2017451568,
    author = {Varun Chopra and Sushil Mehra},
    title = {Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON},
    journal = {International Journal of Applied Information Systems},
    issue_date = {November 2014},
    volume = {7},
    number = {},
    month = {November},
    year = {2014},
    issn = {},
    pages = {51-55},
    numpages = {},
    url = {/archives/volume7/number11/700-1262},
    doi = {10.5120/ijais14-451262},
    publisher = { xA9 2013 by IJAIS Journal},
    address = {}
    }
    
  • %1 451262
    %A Varun Chopra
    %A Sushil Mehra
    %T Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON
    %J International Journal of Applied Information Systems
    %@ 
    %V 7
    %N 
    %P 51-55
    %D 2014
    %I  xA9 2013 by IJAIS Journal
    

Abstract

Wireless Protocol has become a very important part of modern life. From cell phone to laptops everyone uses Wireless for one purpose or another. Wireless Protocol is commonly known as IEEE 802.11 Cliendard. It Uses Several Frames, Header for its operation. Unfortunately none of these are encrypted and hence can be sniffed and analyzed for exploiting. Due to this plaintext nature of 802.11 packets several protection mechanisms provided by 802.11 become useless such as hidden ssid Mac filtering etc. In this paper, such protection mechanisms are analyzed thoroughly and it is explained how python can be used to defeat this protection schema, it is also shown how python can also be used for hardening these security measures.

References

  1. Introduction to 802.11 Technology – Cisco (http://www.cisco.com/web/TH/assets/docs/seminar/200903_Night_Academy_3_1_WLAN_Introduction.pdf)
  2. IEEE 802.11 Wireless LANs (http://inst.eecs.berkeley.edu/~ee122/sp07/80211.pdf)
  3. IEEE 802.11 frame format - Studio Reti (http://www.studioreti.it/slide/802-11-Frame_E_C.pdf)
  4. Information Embedding in IEEE 802.11 Beacon Frame (http://research.ijcaonline.org/ctngc/number3/ctngc1027.pdf)
  5. An Overview of 802.11 Wireless Network Security Standards (http://www.sans.org/reading-room/whitepapers/wireless/overview-80211-wireless-network-security-standards-mechanisms-1530)
  6. Hands on python-Begginers (http://www.nervenet.org/pdf/python3handson.pdf)
  7. Scapy documentation (!) - SecDev.org (www.secdev.org/projects/scapy/files/scapydoc.pdf)
  8. Packet Crafting Using Scapy-William Zereneh (http://www.scs.ryerson.ca/~zereneh/cn8001/CN8001-PacketCraftingUsingScapy-WilliamZereneh.pdf)
  9. Network packet forgery with Scapy – PacSec (https://pacsec.jp/psj05/psj05-biondi-en.pdf)

Keywords

Hidden, Wifi, SSID, Scapy, 802.11

Index Terms

Computer Science
Information Sciences