Thesis Details
Black-Box Analysis of Wi-Fi Stacks Security
The devices on which we rely in our day-to-day lives use complicated protocols. One of the heavily used protocols is Wi-Fi. The growing complexity also increases the room for error during implementation. This thesis studies the Wi-Fi protocol and the use of fuzz testing to generate semi-valid frames, which could reveal vulnerabilities when sent to the tested device. Special attention was devoted to testing the Wi-Fi stack in the ESP32 and ESP32-2S systems. The output of the thesis is a fuzzer capable of testing any Wi-Fi device, a special ESP32 monitoring tool and a set of ESP32 test programs. The tools did not find any potential vulnerabilities.
Wi-Fi, 802.11, ieee802.11, Wi-Fi frames, frame injection fuzzing, fuzz testing, testing, model fuzzing, black-box testing, negative testing, protocol fuzzing, protocol testing, Wi-Fi fuzzing, wifuzz++, ESP32, vulnerability
Drábek Vladimír, doc. Ing., CSc. (DCSY FIT BUT), člen
Holík Lukáš, doc. Mgr., Ph.D. (DITS FIT BUT), člen
Malinka Kamil, Mgr., Ph.D. (DITS FIT BUT), člen
Veselý Vladimír, Ing., Ph.D. (DIFS FIT BUT), člen
@mastersthesis{FITMT23755, author = "Adam Venger", type = "Master's thesis", title = "Black-Box Analysis of Wi-Fi Stacks Security", school = "Brno University of Technology, Faculty of Information Technology", year = 2021, location = "Brno, CZ", language = "english", url = "https://www.fit.vut.cz/study/thesis/23755/" }