Your sketchy friend asks you to help him rig some sort of election. He hands you a business card with credentials for a supercomputer. Armed with massive computing power, you show up to the polling...

Your sketchy friend asks you to help him rig some sort of election. He hands you a business card with credentials for a supercomputer. Armed with massive computing power, you show up to the polling center which has a Wi-Fi network secured with standard WPA2-PSK.
(a) You observe a WPA 4-way handshake. Which values from the handshake are needed to perform a brute-force search for the Wi-Fi password? Select all that apply. Explain and justify your answer. g. on h. SNonce i. The router's MAC address j. The client's MAC address k. The MICs I. All of the above
(b) What can you do after successfully brute forcing the Wi-Fi password? Provide at least two options and justify your answers.
(c) Which defenses would stop your attack? Explain. Clarification: Assume that the supercomputer is able to brute-force the password in in roughly an hour. a. Changing the Wi-Fi password every day b. Using WPA2-Enterprise c. A modern NIDS system
May 24, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here