ISSN: 2278 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 609 All Rights Reserved © 2012 IJARCET WPA Exploitation In The World Of Wireless Network Pranav S. Ambavkar, Pranit U. Patil, Dr.B.B.Meshram, Prof. Pamu Kumar Swamy VJTI, Matunga, Mumbai, India. ambavkar.pranav@gmail.com AbstractWifi device uses security authentication protocol even though they are having some weakness. Generally wep, wpa protocols are used for security purpose. This is already proved that WEP authentication protocol is a weak protocol. By analyzing weakness of wep the concept of WPA and WPA2 developed. In this paper, we will examine the weak- nesses of “Strong WPA/WPA2 Authentication” and see how easy it is to crack the protocol. We will take a look at the new standard’s WPA and WPA2 implementations along with their first minor vulnerabilities and how it is possible to crack it. Index TermsWEP,WPA,WPA2,Aircrack-ng,John-the- ripper,wordfield,reaver I.INTRODUCTION WEP,WPA and WPA2 are the authentication protocols are used for security of wireless network. Researchers had found various weaknesses in WEP old system .To overcome that its place is taken by WPA and WPA2.Today world says that WPA and WPA2 are very strong protocols providing good security. First we will see the brief history of WEP,WPA and WPA2. A.WEP [1] : WEP protocol was not developed by researchers or experts in security and cryptography. So weakness was not considered in all direction. The name David Wagner proved RC4 vulnerable. In 2001, Scott Fluhrer, Itsik Mantin and Adi Shamir published paper on WEP, showing two vulnerabilities in the RC4 encryption algorithm: invariance weaknesses and known Initialization Vector(IV) attacks. Both attacks rely on the fact that for certain key values it is possible for bits in the initial bytes of the key stream to depend on just a few bits of the encryption key. As the encryption key is nothing but concatenation of secret key and IV, certain IV values yield weak keys. B.WPA : Wifi Protected Access (WPA) was created by the Wi-Fi Alliance, an industry trade group, which owns the trademark to the Wi-Fi name and certifies devices that carry that name. IEEE 802.1X authentication server uses, WPA, in which it provides different keys to each user. However, it can also be used in a less secure "pre-shared key" (PSK) mode. Data is encrypted using the RC4 stream cipher, with a 128-bit key and a 48-bit initialization vector (IV). One major improvement in WPA over WEP is the Temporal Key Integrity Protocol (TKIP), which dynamically changes keys as the system is used. The factor Key recovery is possible in WEP was removed in WPA by adding large IV in algorithm. WPA has highly secured payload integrity. The CRC used in WEP is not secured as it is possible to change CRC message during cracking even if WEP key is not known. A more secured algorithm named Message Integrity Code (MIC) is used in WPA to overcome WEP weaknesses. Frame counter mechanism is used in MIC of WPA that prevents execution of repeated attacks. C.WPA2 : There is very much similarities between 802.11i/WPA2 authentication security WPA, with a few differences. It uses AES based algorithm.At the end of the proposed 802.11i transition, AES encryption was put to use as hardware was upgraded to allow for the change. II. WPA/WPA2 WEAKNESSESS Weaknesses of WPA/WPA2 has been discovered. A. Weak password : If client is connected to access point using weak password then password cracking attacks are possible. WPA uses a password for accessing. When device is connected to access point with WPA password, its encrypted form is pass over network which is catch by someone who is listening it. Catching the data is not an issue but if encrypted