In this thesis we have conducted a detailed analysis of protocols used for connecting to wireless networks.
First we studies the procedure of registering to open networks and then to networks protected with various algorithms. With all procedures we examined the messages that are exchanged when registering to a certain network and we checked the security risks involved.
The main emphasis was given to open networks with subsequent requests for registering. First we got to know these networks; we examined what they are like, what they have to offer and where we could find them. Next we checked the security. We tried to intercept a password and avoid registering. In some cases we succeeded, which proves that such networks do not provide a high level of security and that one should be careful when using them.
|