{"published":"2023-05-26 08:39:18","title":"WPA\u3084WPA2\u306b\u3064\u3044\u3066\u306e\u89e3\u8aac","provider_name":"Hatena Blog","author_url":"https://blog.hatena.ne.jp/kazu0905/","height":"190","categories":["\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3","\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3/\u8106\u5f31\u6027"],"url":"https://ethicalhacking.hatenablog.com/entry/2023/05/26/083918","description":"WPA\uff08Wi-Fi Protected Access\uff09\u304a\u3088\u3073WPA2\uff08Wi-Fi Protected Access II\uff09\u306f\u3001\u7121\u7dda\u30cd\u30c3\u30c8\u30ef\u30fc\u30af\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u3092\u5411\u4e0a\u3055\u305b\u308b\u305f\u3081\u306b\u8a2d\u8a08\u3055\u308c\u305f\u6697\u53f7\u5316\u30d7\u30ed\u30c8\u30b3\u30eb\u3067\u3059\u3002\u3053\u308c\u3089\u306e\u30d7\u30ed\u30c8\u30b3\u30eb\u306f\u3001WEP\uff08Wired Equivalent Privacy\uff09\u3068\u3044\u3046\u4ee5\u524d\u306e\u6697\u53f7\u5316\u65b9\u5f0f\u306e\u8106\u5f31\u6027\u3092\u89e3\u6c7a\u3059\u308b\u305f\u3081\u306b\u958b\u767a\u3055\u308c\u307e\u3057\u305f\u3002 WPA\u306f\u3001TKIP\uff08Temporal Key Integrity Protocol\uff09\u3068\u3044\u3046\u4e00\u6642\u7684\u306a\u9375\u3092\u4f7f\u7528\u3057\u3066\u901a\u4fe1\u3092\u6697\u53f7\u5316\u3057\u307e\u3059\u3002TKIP\u306f\u3001WEP\u306eRC4\u6697\u53f7\u5316\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3092\u6539\u5584\u3057\u3001\u3088\u308a\u5f37\u529b\u306a\u9375\u7ba1\u7406\u3068\u30c7\u30fc\u30bf\u306e\u5b8c\u5168\u6027\u30c1\u30a7\u30c3\u30af\u3092\u63d0\u4f9b\u3057\u307e\u3059\u3002WPA\u306f\u307e\u305f\u2026","type":"rich","version":"1.0","author_name":"kazu0905","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fethicalhacking.hatenablog.com%2Fentry%2F2023%2F05%2F26%2F083918\" title=\"WPA\u3084WPA2\u306b\u3064\u3044\u3066\u306e\u89e3\u8aac - \u502b\u7406\u7684\u30cf\u30c3\u30ad\u30f3\u30b0\uff08\u30cf\u30c3\u30ab\u30fc\uff09\u30e9\u30dc\u30e9\u30c8\u30ea\u30fc\uff5c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u76f8\u8ac7\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","blog_title":"\u502b\u7406\u7684\u30cf\u30c3\u30ad\u30f3\u30b0\uff08\u30cf\u30c3\u30ab\u30fc\uff09\u30e9\u30dc\u30e9\u30c8\u30ea\u30fc\uff5c\u30b5\u30a4\u30d0\u30fc\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u76f8\u8ac7","provider_url":"https://hatena.blog","image_url":null,"blog_url":"https://ethicalhacking.hatenablog.com/","width":"100%"}