people choose to use WPA or WPA2 to encrypt their WIFI signal to avoid potential
network threats. ... There are several ways to crack WPA or WPA2 password.
Phishing WPA Password by Hackberry---A Case Study of Hacking Tools Based on Raspberry Pi Lin Shi Fort Hays State University
[email protected]
Keyu Jiang Fort Hays State University
[email protected]
WIFI is the most popular way to access Internet. Because of the vulnerability of WEP, more and more people choose to use WPA or WPA2 to encrypt their WIFI signal to avoid potential network threats. But WPA is not safe than before. There are several ways to crack WPA or WPA2 password. This paper proposed a new phishing way to phish WPA or WPA2 password based on the otherness of WEP and WPA.
This paper give a depth research on WEP and WPA protocol, and compared them in several different ways. Combined with WEP and WPA protocol, a phishing attack has been designed to cheat users input WIFI password with WEP to replace original WPA password. This phishing attack need much more time than any other crack-attacks. But the success rate is much higher than others. So in order to solve this problem, a portable and mobile hacking device based on Raspberry Pi, which called “Hackberry”, has been designed to realize this phishing attack.
Hackberry is a tiny size home-made hacking tool based on Raspberry Pi that we design as a remote hacking station. According to the size of Raspberry Pi, this hacking tool measures 85.60mm * 56mm * 21mm, with a little overlap for the SD card and connectors which project over the edges. Several auto-run scripts have been installed in the operating system of Hackberry to execute specific cyber-attack. The effect of this hacking device is expected to collect from testing in a real simulative circumstance.
Keyword: Phishing, WPA, WEP, Hacking tool, Raspberry Pi, Hackberry, Cyber-attack.