Change search
Refine search result
1 - 1 of 1
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Alm, Fredrik
    University of Skövde, School of Humanities and Informatics.
    Wireless Protected Setup (WPS): Prestandajämförelse mellan Reaver och Bully2015Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Wireless Protected Setup (WPS) is a security protocol for wireless networks. Its design contains a serious security flaw that could allow an attacker access to a password-protected wireless network. An attack can be executed using various tools available.

    In this report, the software-tools Reaver and Bully are compared in performance against WiFi’s WPS-protocol, where Bully previously has been shown to be more effective and predicted faster to execute a bruteforce-attack. A practical laboration has been executed in order to determine differences in speed that can be seen between the tools Reaver and Bully in a bruteforce-attack. The experiment was done by measuring the time it took both tools to test 100 PIN-numbers against a router without protection for WPS.

    The result shows that Bully performs a bruteforce-attack in higher speed compared to Reaver. However, with the higher attack-speed that Bully uses, some stability issues may follow, opening the topic of future discussion regarding priorities of speed vs. stability for successful attacks.

1 - 1 of 1
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf