Detection method of wpa2 protocol vulnerability

A detection method and a vulnerability technology, applied in wireless communication, electrical components, security devices, etc., can solve problems such as threats to personal information security, personal information data theft, etc., to improve accuracy, improve detection efficiency and convenience Effect

Active Publication Date: 2020-05-05
ZHEJIANG UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And these vulnerabilities may exist in all smart devices with wireless network connection functions (including smart phones, tablet computers, etc.), if the WPA2 protocol protection of the smart device under test is cracked, the user's network access information may be monitored, There is a risk of their personal information being stolen, threatening the security of personal information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method of wpa2 protocol vulnerability
  • Detection method of wpa2 protocol vulnerability
  • Detection method of wpa2 protocol vulnerability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Embodiment 1, the detection device (hereinafter referred to as detection device for short) of WPA2 protocol vulnerability, such as Figure 4 As shown, it includes a control module 1 , a detection module 2 , a verification module 3 and a monitoring module 4 . The control module 1 is connected with the detection module 2, the verification module 3 and the monitoring module 4 respectively, and the control module 1 also communicates with the computer through the USB interface. The detection module 2 and the monitoring module 4 are respectively connected to the smart device under test through a network antenna, that is, the detection module 2 and the monitoring module 4 can transmit and receive wireless network signals. The monitoring module 4 is connected to the verification module 3 with signals.

[0091] Note: Figure 4 The arrows in indicate the direction of signal transmission, image 3 The dotted line in indicates that the signal is transmitted through the wireless ne...

Embodiment 2

[0097] Embodiment 2, the detection method of WPA2 protocol vulnerability, such as Figure 5 and Figure 6 As shown, the detection device in Embodiment 1 triggers the vulnerability of the smart device to be tested by means of a message replay attack, thereby detecting whether the smart device to be tested has a WPA2 protocol vulnerability.

[0098] Such as Figure 5 As shown, the detection method for WPA2 protocol vulnerability using the detection device of embodiment 1 specifically includes the following steps:

[0099] Note: Figure 5 The arrows in the middle indicate the order of the steps, and the notes on the arrows indicate the requirements and instructions for the execution of the steps.

[0100] The following is a detailed description of the entire detection method according to the process:

[0101] S1. Start detection device:

[0102] The computer and the detection device are connected through a USB interface, and the staff configures the access point name and pas...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a detection device for WPA2 protocol vulnerability, including a control module, a detection module, a verification module and a monitoring module; the control module is used to control and schedule the detection module, verification module and monitoring module; the detection module is used to trigger The vulnerability of the smart device to be tested; the monitoring module is used to monitor and save the communication data of the channel where the smart device to be tested is located; the verification module is used to extract the data packets monitored by the monitoring module, and use the data packets to verify whether the smart device to be tested exists Vulnerabilities of the WPA2 protocol. The present invention also proposes a method for detecting the vulnerability of the WPA2 protocol using the above-mentioned detection device. By monitoring the data of the channel where the smart device to be tested communicates with the detection device in a wireless network, the data packet obtained by monitoring is ciphertext. Perform analysis, and judge whether the WPA2 vulnerability of the smart device is triggered according to the result of the analysis, so as to ensure that the detection result is correct.

Description

technical field [0001] The invention relates to the field of wireless communication networks, in particular to a detection device and method for WPA2 protocol vulnerability. Background technique [0002] With the development of wireless network technology, wireless network has gradually become the main network access method for people, and the application of routers and Wi-Fi networks is becoming more and more popular. Different from wired networks, wireless networks transmit information in an open medium, so within a limited range, devices with the same protocol standard can receive data packets. Therefore, data security, confidentiality and authentication association methods are the core of the entire wireless network connection. [0003] In 1997, the Institute of Electrical and Electronics Engineers (Institute of Electrical and Electronics Engineers, hereinafter referred to as IEEE) formulated the first version of the standard for wireless local area networks—IEEE 802.11...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W12/02H04W12/06H04W24/08H04W12/122
CPCH04W12/00H04W12/02H04W12/06H04W24/08
Inventor 蒋云帆刘鹏
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products