International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 174 - Issue 26 |
Published: Mar 2021 |
Authors: Michael Kyei Kissi, Michael Asante |
![]() |
Michael Kyei Kissi, Michael Asante . Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools. International Journal of Computer Applications. 174, 26 (Mar 2021), 19-26. DOI=10.5120/ijca2021921186
@article{ 10.5120/ijca2021921186, author = { Michael Kyei Kissi,Michael Asante }, title = { Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools }, journal = { International Journal of Computer Applications }, year = { 2021 }, volume = { 174 }, number = { 26 }, pages = { 19-26 }, doi = { 10.5120/ijca2021921186 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2021 %A Michael Kyei Kissi %A Michael Asante %T Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools%T %J International Journal of Computer Applications %V 174 %N 26 %P 19-26 %R 10.5120/ijca2021921186 %I Foundation of Computer Science (FCS), NY, USA
Extensible Authentication Protocol (EAP) was designed to provide a general structure for several different authentication methods. IEEE 802.1X uses EAP as an authentication tool. The IEEE 802.1X standard defines a client-server authentication and access control protocol that restricts unauthorized users from connecting to a network. This paper aims at using penetration testing to conduct security assessment of some IEEE 802.1x Port-Based Authentication protocols (PEAP, EAP-TTLS and Inner Authentication Method MSCHAPv2 and PAP). Vulnerabilities identified were exploited using Kali Linux with its Aircrack-ng tools.