Hacking wi-fi protected access (WPA) dengan menggunakan backtrack 2 = Wi-fi protected access (WPA) hacking using backtrack 2

Irwanda, Bobby (2009) Hacking wi-fi protected access (WPA) dengan menggunakan backtrack 2 = Wi-fi protected access (WPA) hacking using backtrack 2. Bachelor thesis, Universitas Pelita Harapan.

[thumbnail of Title]
Preview
Text (Title)
Cover.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (20kB) | Preview
[thumbnail of Abstract]
Preview
Text (Abstract)
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (172kB) | Preview
[thumbnail of TOC]
Preview
Text (TOC)
TOC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (266kB) | Preview
[thumbnail of Chapter 1]
Preview
Text (Chapter 1)
Chapter 1.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (116kB) | Preview
[thumbnail of Chapter 2] Text (Chapter 2)
Chapter 2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)
[thumbnail of Chapter 3] Text (Chapter 3)
Chapter 3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (632kB)
[thumbnail of Chapter 4] Text (Chapter 4)
Chapter 4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (4MB)
[thumbnail of Chapter 5] Text (Chapter 5)
Chapter 5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (219kB)
[thumbnail of Bibliography]
Preview
Text (Bibliography)
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (168kB) | Preview
[thumbnail of Appendices] Text (Appendices)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.

Download (1MB)

Abstract

The improvement of computer technology causes the development of computer networking technology improves. Now, the computer networking is moving away from wired networking to the wireless networking. This movement not only gives a lot of advantages to the users but also brings possible weaknesses which are prone to attacks. One of them is about the security of the network. The security of wireless network is not as good as the wired network, because of that many efforts had been done by implementing better security policy. One of the wireless security protocol is Wi-Fi Protected Access (WPA). This protocol is the successor of Wired Protected Access (WEP). This replacement was made to fix the weaknesses in WEP, but WPA also have some weaknesses which have been exploited by hackers too. This final project presents the exploitation of WPA’s weaknesses. The exploitation will start from the wireless network sniffing activity, capturing the handshaking package, creating a dictionary file, translating the pre-shared key and finally using the decrypted key to enter the network. This final project also gives some preventive actions to minimize the probability of network for being hacked. The prevention action is made from the analysis of the attack which were done in this research. Finally to minimize the possibility from being hacked by using WPA, there are some solutions like using choosing a good pre-shared key, and changing the preshared key periodically. The solutions cannot insure the network is free from hacking, but they will reduce the probability from being hacked successfully and increase the time required for a hacker to hack user’s WLAN.
Item Type: Thesis (Bachelor)
Creators:
Creators
NIM
Email
ORCID
Irwanda, Bobby
NIM0832004007
UNSPECIFIED
UNSPECIFIED
Contributors:
Contribution
Contributors
NIDN/NIDK
Email
Thesis advisor
Hardjono, Benny
NIDN0404086401
benny.hardjono@uph.edu
Thesis advisor
Aribowo, Arnold
NIDN0304057602
arnold.aribowo@uph.edu
Additional Information: SK 83-04 IRW h ; T 64965
Subjects: T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7885-7895 Computer engineering. Computer hardware
Divisions: University Subject > Historic > Faculty/School > Computer System Engineering
Historic > Faculty/School > Computer System Engineering
Depositing User: Christine Natalia Nababan
Date Deposited: 27 Apr 2021 08:36
Last Modified: 16 Oct 2024 07:28
URI: http://repository.uph.edu/id/eprint/29565

Actions (login required)

View Item
View Item