International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 165 WLAN Penetration Examination of The University of Pembangunan Panca Budi Akhyar Lubis 1 , Andysah Putera Utama Siahaan 2 Faculty of Computer Science, Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract–Hacking and cracking passwords on Wi- Fi in campus location is criminal acts that might approach because it could be considered stealing. Many Wi-Fi SSID are protected. It means that the owner of the Wi-Fi does not allow connections used freely by strangers. The are Many ways to crack it. A penetration test is one of the popular techniques to break the password. This tool directs the user to try to connect to the similar SSID name. However, they do not realize the name they join in is a fake SSID. This moment is used by the attackers to obtain the password. Soon after they try to connect several times, the attacker has been already recorded the SSID password. Keywords –Security, Penetration Test, Hacking, Wi-Fi I. INTRODUCTION Internet connectivity continues to grow up as millions of new devices are connected to the global network [4].Many users do not know the danger of wireless connections [6]. Security is the big problem of information system [3]. The University of Pembangunan Panca Budi has implemented the IS / IT as a supporting system. It triggers business in the world of education. A critical issue for educational institutions is the threat of a rise in attacks against information systems. This problem is due to a combination of increasingly sophisticated attack tools and automated, the growing number of discovered attacks and improved user connectivity. As the system is open to students, staff, faculty and accessible in public, so the network becomes more complex and more vulnerable to security breaches. That is why the problem of information security is one of the most challenging problems faced by companies and educational institutions.The IT administrator keeps trying to improve the the security to protect the data from being stolen. The first thing before making the attack, we have to do a Reconnaissance. It makes our target is familiar to us [1].Penetration testing is performed on a wireless network in the Faculty of Computer Science to identify the weaknesses and the uncover risk of the system on a wireless network [2][5]. Testing allows use several methods to get into the target tissue, often to penetrate network security system begins at a relatively low priorities parts and then used it to attack sensitive areas. One of them is the attacker will try to get into the network infrastructure. It can easily monitor the activities of the user or users via a wireless network. The attacker must be able to enter into the internal network via wireless LAN. II. THEORIES Several models authentication such as MAC address filtering, WEP, WPA, WPA2, SSID filtering and Filtering Protocol can secure LAN and WLAN. The University of Pembangunan Panca Budi uses a cable-based LAN connection and wireless. Almost all users, faculty staff, students and employees take advantage of this technology. They cover several points installing the hotspot in some areas. It makes the signal covers the entire area of the campus location. There are several points of the access point used by employees to access the local network of information systems related to the employee, the financial system and the academy system. The administrator gives the password using WPA2 security system to users who want to access the network. Fig. 1 The network diagram Figure 1 is the example the network diagram on campus. As we can see, there are various computers connect to the Wi-Fi available. We do not know who, where and when the attackers attack the security. Some of them can use direct cable connection or even