Cracking WPA / WPA2 in the cloud

View/ Open
Abstract
Nowadays, as we know with the evolution of technology, the wireless transmission mode of information prevails in almost all areas because of its convenience and flexibility from the lack of cables. But of course there is less security involved because of the wireless transmission of the packets. This study aims to deepen the security of wireless networks in the protocols WEP, WPA, WPA2 and the exploitation of vulnerabilities for the extraction of passwords in their network. The main part however, subject to the speed of cracking codes. At this point, created the concept of “cloud computing” in which the computational power of many systems joined in order to operate multiple processors (CPU) or graphic cards (GPU) together and create clusters. In the current study we will create a computer network with a central server and a client connected to the server. Additionally, server will have an SQL database with all tables and dictionaries which client have access and required for the attack on a wireless network WPA/WPA2 type.