WLAN Setup and Security
Note: this was converted using from LaTeX to Markdown using ChatGPT and Gemini. The original PDF and bibliography can be found here and here. WLAN setup and security Laboratory protocol Exercise 11: WLAN setup and security Figure: Grouplogo Subject: ITSI/NWT Class: 3AHITN Name: Stefan Fürst, Justin Tremurici Group Name/Number: GROUPNAME/12 Supervisor: ANGE, ZIVK Exercise dates: 16.05.2025 | 06.06.2025 Submission date: 10.06.2025 Table of Contents Task definition Summary Complete network topology of the exercise Exercise Execution Setting up the Network Configuring the Router Configuring the Access Point Testing connectivity and DHCP addresses Access Point Isolation Attacking the Wi-Fi Network Setting up the Wi-Fi Adapter Starting the attack Sending Deauthentication Frames Analyzing the 4-Way Handshake in Wireshark Cracking the Password Testing My Own Wi-Fi Mitigations of This Attack How WPA3 improves security Possible WPA3 Attacks References Task definition This task focuses on the setup and subsequent attack of a WLAN network. The initial phase, “Übung 10: Einrichten eines WLAN-Netzwerks,” guides students through provisioning a WLAN. This involves configuring an Access Point (AP), planning channel usage, setting up Network Address Translation (NAT) and a DHCP service, and ensuring full connectivity between wireless and wired clients. Students configure a router with NAT, establish a DHCP server, and set up the AP with WPA2 security, assessing password strength and measuring channel utilization. Connectivity tests confirm communication within the network and to the internet. Access Point Isolation is also explored, with a bonus task involving its configuration and demonstration of its effects. ...