THE 3
rd
INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
215
Flooding
attacks
Weak initialization vector (IV) attacks
Spoofing attacks
During a brute force hack, the attacker attempts all possible password
combinations in quest of a password. The
exhaustive attack method is
another name for this method. A four-digit password with only numbers, for
example, may have a maximum of 10,000 possible possibilities. As a result,
after a maximum of 10,000 attempts, the password can be decrypted. The
brute force method can theoretically decrypt any password. Attackers, on the
other hand, are always looking for ways to reduce the amount of time it takes
to decrypt the password. When a WLAN's security policy is WPA/WPA2-
PSK, WAPI-PSK, or WEP-Shared-Key, attackers can decrypt the password
using the brute force approach. By extending
the time it takes to decode
passwords, using a key helps protect WLANs from brute force assaults.
During WPA/WPA2-PSK, WAPI-PSK, or
WEP-Shared-Key authentication,
an AP examines whether the number of key negotiation attempts exceeds
the configured threshold. If the threshold is surpassed, the AP suspects the
user is attempting to decode the password using the brute force approach
and sends an alarm to the AC. The AP adds the user to the dynamic ban list
and discards all of the user's packets until the dynamic ban list entry expires
if the dynamic ban list function is enabled.
Dostları ilə paylaş: