The Methods of Protection and Hacking of Modern Wi-Fi Networks

: pp. 1 - 6
Department of Information Technology Security at Lviv Polytechnic National University

In this paper, we discuss the most popular attacks on personal Wi-Fi networks, offer some improvements to the hacking process and possible methods of protection.

[1] S. Fluhrer, I. Mantin, and A. Shamir. "Weaknesses in the key scheduling algorithm of RC4", International Workshop on Selected Areas in Cryptography, Springer, Berlin, Heidelberg, 2001, p. 1-24.

[2] M. Vanhoef and E. Ronen. "Dragonblood: A Security Analysis of WPA3’s SAE Handshake", p. 1-16.

[3] Aircrack-ng. [Online]. Available: [Accessed: Nov. 25, 2018].

[4] IEEE 802.11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2016 revision). IEEE-SA. 14 December 2016. doi:10.1109/IEEESTD.2016. 7786995. ISBN 978-1-5044-3645-8.

[5] Federal Information Processing Standards (FIPS) Publication 197. Announcing the ADVANCED ENCRYPTION STANDARD (AES). November 26, 2001. Available at publications/fips/fips197/fips-197.pdf [Accessed:Nov.25, 2018]

[6] NIST Special Publication 800-38C. Recommendation for Block Cipher Modes of Operation: The CCM Mode for Authentication and Confidentiality. May 2004.

[7] Have I been pwned? Biggest free online e-mail and password database. (Almost 8 billion leak accounts ) [Online]. Available: [Accessed: Nov. 25, 2018].

[8] Online Wi-Fi password database collected by Router scan software (Almost 10 million AP names and passwords) [Online]. Available: [Accessed: Nov. 25, 2018].