Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON

Varun Chopra, Sushil Mehra Published in Security

International Journal of Applied Information Systems
Year of Publication: 2014
© 2013 by IJAIS Journal
10.5120/ijais14-451262
Download full text
  1. Varun Chopra and Sushil Mehra. Article: Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON. International Journal of Applied Information Systems 7(11):51-55, November 2014. BibTeX

    @article{key:article,
    	author = "Varun Chopra and Sushil Mehra",
    	title = "Article: Cracking and Hardening Hidden SSID Mechanism in 802.11 using PYTHON",
    	journal = "International Journal of Applied Information Systems",
    	year = 2014,
    	volume = 7,
    	number = 11,
    	pages = "51-55",
    	month = "November",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

Wireless Protocol has become a very important part of modern life. From cell phone to laptops everyone uses Wireless for one purpose or another. Wireless Protocol is commonly known as IEEE 802.11 Cliendard. It Uses Several Frames, Header for its operation. Unfortunately none of these are encrypted and hence can be sniffed and analyzed for exploiting. Due to this plaintext nature of 802.11 packets several protection mechanisms provided by 802.11 become useless such as hidden ssid Mac filtering etc. In this paper, such protection mechanisms are analyzed thoroughly and it is explained how python can be used to defeat this protection schema, it is also shown how python can also be used for hardening these security measures.

Reference

  1. Introduction to 802.11 Technology – Cisco (http://www.cisco.com/web/TH/assets/docs/seminar/200903_Night_Academy_3_1_WLAN_Introduction.pdf)
  2. IEEE 802.11 Wireless LANs (http://inst.eecs.berkeley.edu/~ee122/sp07/80211.pdf)
  3. IEEE 802.11 frame format - Studio Reti (http://www.studioreti.it/slide/802-11-Frame_E_C.pdf)
  4. Information Embedding in IEEE 802.11 Beacon Frame (http://research.ijcaonline.org/ctngc/number3/ctngc1027.pdf)
  5. An Overview of 802.11 Wireless Network Security Standards (http://www.sans.org/reading-room/whitepapers/wireless/overview-80211-wireless-network-security-standards-mechanisms-1530)
  6. Hands on python-Begginers (http://www.nervenet.org/pdf/python3handson.pdf)
  7. Scapy documentation (!) - SecDev.org (www.secdev.org/projects/scapy/files/scapydoc.pdf)
  8. Packet Crafting Using Scapy-William Zereneh (http://www.scs.ryerson.ca/~zereneh/cn8001/CN8001-PacketCraftingUsingScapy-WilliamZereneh.pdf)
  9. Network packet forgery with Scapy – PacSec (https://pacsec.jp/psj05/psj05-biondi-en.pdf)

Keywords

Hidden, Wifi, SSID, Scapy, 802.11