CEH-aligned penetration testing on wireless protocols β WEP, WPA, WPA2. Documented attack methodologies and hardening strategies.
Conducted comprehensive wireless network security assessments simulating real-world attacks on common Wi-Fi security protocols. Documented exploitation techniques and deployed defense strategies to harden enterprise wireless infrastructure.
βββββββββββββββββββ
β Kali Linux VM β
β (Aircrack-ng) β
ββββββββββ¬βββββββββ
β
βΌ
βββββββββββββββββββ βββββββββββββββββββ
β Target Router ββββββΆβ Connected VMs β
β (WEP/WPA/WPA2) β β (Lab Network) β
βββββββββββββββββββ βββββββββββββββββββ
β
βΌ
βββββββββββββββββββ βββββββββββββββββββ
β Wireless Card β β Deauth Attack β
β (Monitor Mode) ββββββΆβ Handshake Cap β
βββββββββββββββββββ βββββββββββββββββββ
airodump-ngWEP Cracking
aircrack-ngWPA/WPA2 β Handshake Capture
aircrack-ng with rockyou.txtWPA2 β KRACK Attack Simulation
| Protocol | Attack | Result | Time |
|---|---|---|---|
| WEP | IV Injection | β Cracked | ~8 min |
| WPA | Handshake + Dict Attack | β Cracked (weak password) | ~45 min |
| WPA2 | Handshake + Dict Attack | β Cracked (weak password) | ~45 min |
| WPA2 | KRACK Simulation | β οΈ Partial (client dependent) | β |
| Control | Status | Notes |
|---|---|---|
| Encryption Protocol | β Needs Upgrade | WEP in use on legacy APs |
| Password Complexity | β οΈ Weak | Short passwords easily cracked |
| Rogue AP Detection | β Missing | No monitoring in place |
| Network Segmentation | β Implemented | VLANs configured post-assessment |
| 802.1X / EAP-TLS | β οΈ Planned | Migration in progress |
| WPA3 Adoption | β Complete | Post-assessment deployed |
Kali Linux Β· Aircrack-ng Β· Wireshark Β· Nmap Β· Airmon-ng Β· Crunch Β· WPA_supplicant
All testing was performed on networks and systems owned by me or with explicit written consent. No wireless networks were targeted without permission. This project is for educational and authorised security testing purposes only.