|
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
| Volume 174 - Issue 26 |
| Published: Mar 2021 |
| Authors: Michael Kyei Kissi, Michael Asante |
10.5120/ijca2021921186
|
Michael Kyei Kissi, Michael Asante . Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools. International Journal of Computer Applications. 174, 26 (Mar 2021), 19-26. DOI=10.5120/ijca2021921186
@article{ 10.5120/ijca2021921186,
author = { Michael Kyei Kissi,Michael Asante },
title = { Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools },
journal = { International Journal of Computer Applications },
year = { 2021 },
volume = { 174 },
number = { 26 },
pages = { 19-26 },
doi = { 10.5120/ijca2021921186 },
publisher = { Foundation of Computer Science (FCS), NY, USA }
}
%0 Journal Article
%D 2021
%A Michael Kyei Kissi
%A Michael Asante
%T Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools%T
%J International Journal of Computer Applications
%V 174
%N 26
%P 19-26
%R 10.5120/ijca2021921186
%I Foundation of Computer Science (FCS), NY, USA
Extensible Authentication Protocol (EAP) was designed to provide a general structure for several different authentication methods. IEEE 802.1X uses EAP as an authentication tool. The IEEE 802.1X standard defines a client-server authentication and access control protocol that restricts unauthorized users from connecting to a network. This paper aims at using penetration testing to conduct security assessment of some IEEE 802.1x Port-Based Authentication protocols (PEAP, EAP-TTLS and Inner Authentication Method MSCHAPv2 and PAP). Vulnerabilities identified were exploited using Kali Linux with its Aircrack-ng tools.