Irwanda, Bobby (2009) Hacking wi-fi protected access (WPA) dengan menggunakan backtrack 2 = Wi-fi protected access (WPA) hacking using backtrack 2. Bachelor thesis, Universitas Pelita Harapan.
Preview
Cover.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (20kB) | Preview
Preview
Abstract.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (172kB) | Preview
Preview
TOC.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (266kB) | Preview
Preview
Chapter 1.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (116kB) | Preview
![Chapter 2 [thumbnail of Chapter 2]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 2.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (1MB)
![Chapter 3 [thumbnail of Chapter 3]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 3.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (632kB)
![Chapter 4 [thumbnail of Chapter 4]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 4.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (4MB)
![Chapter 5 [thumbnail of Chapter 5]](http://repository.uph.edu/style/images/fileicons/text.png)
Chapter 5.pdf
Restricted to Registered users only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (219kB)
Preview
Bibliography.pdf
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (168kB) | Preview
![Appendices [thumbnail of Appendices]](http://repository.uph.edu/style/images/fileicons/text.png)
Appendices.pdf
Restricted to Repository staff only
Available under License Creative Commons Attribution Non-commercial Share Alike.
Download (1MB)
Abstract
The improvement of computer technology causes the development of computer networking technology improves. Now, the computer networking is moving away from wired networking to the wireless networking. This movement not only gives a lot of advantages to the users but also brings possible weaknesses which are prone to attacks. One of them is about the security of the network. The security of wireless network is not as good as the wired network, because of that many efforts had been done by implementing better security policy. One of the wireless security protocol is Wi-Fi Protected Access (WPA). This protocol is the successor of Wired Protected Access (WEP). This replacement was made to fix the weaknesses in WEP, but WPA also have some weaknesses which have been exploited by hackers too. This final project presents the exploitation of WPA’s weaknesses. The exploitation will start from the wireless network sniffing activity, capturing the handshaking package, creating a dictionary file, translating the pre-shared key and finally using the decrypted key to enter the network. This final project also gives some preventive actions to minimize the probability of network for being hacked. The prevention action is made from the analysis of the attack which were done in this research. Finally to minimize the possibility from being hacked by using WPA, there are some solutions like using choosing a good pre-shared key, and changing the preshared key periodically. The solutions cannot insure the network is free from hacking, but they will reduce the probability from being hacked successfully and increase the time required for a hacker to hack user’s WLAN.
Item Type: | Thesis (Bachelor) |
---|---|
Creators: | Creators NIM Email ORCID Irwanda, Bobby NIM0832004007 UNSPECIFIED UNSPECIFIED |
Contributors: | Contribution Contributors NIDN/NIDK Email Thesis advisor Hardjono, Benny NIDN0404086401 benny.hardjono@uph.edu Thesis advisor Aribowo, Arnold NIDN0304057602 arnold.aribowo@uph.edu |
Additional Information: | SK 83-04 IRW h ; T 64965 |
Subjects: | T Technology > TK Electrical engineering. Electronics Nuclear engineering > TK7885-7895 Computer engineering. Computer hardware |
Divisions: | University Subject > Historic > Faculty/School > Computer System Engineering Historic > Faculty/School > Computer System Engineering |
Depositing User: | Christine Natalia Nababan |
Date Deposited: | 27 Apr 2021 08:36 |
Last Modified: | 16 Oct 2024 07:28 |
URI: | http://repository.uph.edu/id/eprint/29565 |