Author Login Editor-in-Chief Peer Review Editor Work Office Work

Computer Engineering ›› 2008, Vol. 34 ›› Issue (22): 192-194. doi: 10.3969/j.issn.1000-3428.2008.22.067

• Security Technology • Previous Articles     Next Articles

MIM Attack to Secure Authentication Protocol with 802.1X-EAP

LI Yong-qiang, WANG Hai-hang   

  1. (Department of Computer, Tongji University, Shanghai 201804)
  • Received:1900-01-01 Revised:1900-01-01 Online:2008-11-20 Published:2008-11-20

针对802.1X-EAP安全认证协议的中间人攻击

李永强,汪海航   

  1. (同济大学计算机系,上海 201804)

Abstract: This paper proposes the wireless Man In Middle(MIM) framework, which actively proves the vulnerability of MIM by applying the MIM technique in WLAN environment, whose security is applied with 802.1X and Extensible Authentication Protocol(EAP). It describes the design of the required functions and modules, proposes that it is possible to collect WLAN authentication information of the unauthorized user by using the wireless MIM framework under the EAP-MD5 and EAP-TTLS environment.

Key words: 802.1X protocol, Extensible Authentication Protocol(EAP), Rouge AP, Man In Middle(MIM) attack

摘要: 基于802.1X的可扩展认证协议(EAP)是目前主流的无线网络认证协议。该文介绍802.1X、EAP及中间人攻击的相关技术,分析针对802.1X-EAP的中间人攻击流程,给出在EAP-MD5网络环境下对无线网络进行中间人攻击的框架及流程,从而证实目前无线网络设施遭受中间人攻击风险的可能性。

关键词: 802.1X协议, 可扩展认证协议, 非法AP, 中间人攻击

CLC Number: