Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Aircrack ng org doku php id compatibility_drivers

20/10/2021 Client: muhammad11 Deadline: 2 Day

Exploitation of WPA Authentication

Pranav S. Ambavkar, Pranit U. Patil, Prof. Pamu Kumar Swamy VJTI, Matunga, Mumbai, India.

ABSTRACT These days wireless communication is basic need of people. Users want to secure their important information.

For security purpose different kinds of protocols are available. But fast development in codes, standards and

technology gives opportunity to hack and steal the important information over wireless network. Therefore

the security of network should be in consideration. Today there exist different kinds of tools and programs

inbuilt in operating system. By using them and analyzing weaknesses of protocol used, cracking of protocol is

easy. In this paper we will learn authentication WPA standard and way to crack WPA.

Keywords - WPA, WEP, MAC layer, attacks, 4-way handshake.

I. INTRODUCTION The whole world of wireless communications, as we

know it today, started in 1895, when Guglielmo

Marconi transmitted the Morse code for letter "S"

(three-dots) over a distance of 3 kms by

electromagnetic waves. From this time, wireless

communications have grown up into a key element of

modern society. WiFi - Wireless LAN (Local Area

Network) is the main technology for wireless

connection to computer networks.Electronics devices

can exchange information over network by using

Wifi. [1]These devices can connect to each other

also to Internet,router,bluethooth devices. Routers

has a range of about 20 meters (65 ft) indoors and a

greater range outdoors.“Wi-Fi” is a trademark of the

Wi-Fi Alliance and the brand name for products

using the IEEE 802.11 family of standards.

Portable devices such as mobile, laptop,

tablet can connect to Internet, wireless network, Wi-fi

and share information among themselves. The

information might be related to their personal,

organization, national security. So for security

purpose they have authentication protocols are

designed.Without which no one can access network.

There exist several standards for secure

communication protocols in WiFi like WEP (Wired

Equivalent Privacy), WPA (WiFi Protected Access)

and WPA2. Different kinds of programs and tools are

used to crack these standards such as operating

system used for penetration.By using such tools

cracker or hackers get practice to find weaknesses of

authentication protocols.and by analyzing these

weakenesses they hack the wireless network and

steal the important information. Today for

authentication used for good security is WPA.WPA

cracking is done by by only brute force attack. But it

takes a lot of time to crack WPA.In these paper we

will also study how to crack WPA by using brute

force attack.

In this paper we will discuss IEEE 802.11

architecture, general frame format, different kinds of

attack on wireless network, authentication used for

security and how WPA cracking is possible.

II. IEEE 802.11 ARCHITECTURE A.Architecture Component[2] : IEEE 802.11

architecture is subdivided into cells. Each cell is

called as basic service set (BSS).Each BSS has one

access point and it controls the BSS. Every BSS is

connected to each other by a single backbone line

structure called as distribution system.

Fig1. Architecture Component

B. IEEE 802.11 Layers Description : IEEE 802.11 is

covered by mainly two layers data link layer and

physical layer. The physical layer of the original

802.11 standardized three wireless data exchange

techniques:

http://en.wikipedia.org/wiki/Trademark
http://en.wikipedia.org/wiki/Wi-Fi_Alliance
http://en.wikipedia.org/wiki/IEEE_802.11
Pranav S. Ambavkar, Pranit U. Patil, Prof . Pamu Kumar Sw amy / IOSR Journal of

Engineering (IOSRJEN) www .iosrjen.org ISSN : 2250 -3021

Vol. 2 Issue 2, Feb.2012, pp. 320-324

www.iosrjen.org 321 | P a g e

-Infrared (IR)

-Frequency hopping spread spectrum (FHSS)

-Direct sequence spread spectrum (DSSS)

Fig.2 IEEE 802.11 Layers Description

[3]The 802.11 standard specifies a common

medium access control (MAC) Layer, which provides

a variety of functions that support the operation of

802.11-based wireless LANs. In general, the MAC

Layer manages and maintains communications

between 802.11 stations (radio network cards and

access points) by coordinating access to a shared

radio channel and utilizing protocols that enhance

communications over a wireless medium. Often

viewed as the "brains" of the network, the 802.11

MAC Layer uses an 802.11 Physical (PHY) Layer,

such as 802.11b or 802.11a, to perform the tasks of

carrier sensing, transmission, and receiving of 802.11

frames.

C. Introduction to 802.11 wireless frames : The best

way to understand how any type of network protocol

work is to look at it from the packet level. We’ll first

be describing how we can capture wireless frames

that are flying through the air and then talk about

dissecting and analyzing these frames for purposes of

understanding how these packets look like under

normal traffic conditions. Both the station and AP

radiate and gather 802.11 frames as needed. The

format of frames is illustrated below. Most of the

frames contain IP packets. The other frames are for

the management and control of the wireless

connection.

D. General Frame Format : Each frame consists of

- A MAC Header: frame control, duration, address,

and sequence control information

- A variable length frame body

- A frame check sequence (FCS), contains IEEE 32-

bit cyclic redundancy code (CRC)

Fig.3 General Frame Format

E. Capturing wireless packets : In case of wireless

technology data or information is send or receive

over air. Air makes a role as a mediator between two

or more wireless devices. So that cracker can easily

capture the packet over air and sniff the information.

To capture wireless packets sniffing device

should know detail knowledge of capturing network

and to this it should have proper hardware and

software build over it. And that hardware should be

Network Interface Card(NIC).

Under normal circumstances when your

wireless NIC are sending and receiving wirelessly,

they’re placed into a mode called managed mode, and

in this mode, the wireless NIC will not pick up any

wireless packets which are not destined for it, thus

defeating the purposes of being a sniffing station. In

order for the wireless NIC to pick up all packets

regardless of who the packet is for, the NIC will have

to be placed in rfmon mode.

III. ATTACKS IN AD-HOC NETWORK[6][8]

From the point of view of intrusion detection and

response, we need to observe and analyze the

anomalies due to both the consequence and technique

of an attack. While the consequence gives evidence

that an attack has succeeded or is unfolding, the

technique can often help identify the attack type and

even the identity of the attacker. Attacks in MANET

can be categorized according to their consequences as

the following:

A.Drop Attack: An attacker can drop received

routing messages, instead of relaying them as the

protocol requires, in order to reduce the quantity of

routing information available to the other nodes

Pranav S. Ambavkar, Pranit U. Patil, Prof . Pamu Kumar Sw amy / IOSR Journal of

Engineering (IOSRJEN) www .iosrjen.org ISSN : 2250 -3021

Vol. 2 Issue 2, Feb.2012, pp. 320-324

www.iosrjen.org 322 | P a g e

B.Routing Loop: A loop is introduced in a route

path.

C.Network Partition: A connected network is

partitioned into k (k >= 2) sub networks where nodes

in different sub networks cannot communicate even

though a route between them actually does exist.

D.Selfishness: A node is not serving as a relay to

other nodes.

E.Sleep Deprivation: A node is forced to exhaust its

battery power.

F.Denial-of-Service: A node is prevented from

receiving and sending data packets to its destinations

Some of the common attacking techniques are:

G.Cache Poisoning: Incorrect routes to be stored in

the routing table of legitimate nodes

H.Fabricated Route Messages: Route messages

(route requests, route replies, route errors, etc.) with

malicious contents are injected into the network.

Specific methods include: a) False Source Route: An

incorrect route is advertised into the network, e.g.,

setting the route length to be 1 regardless where the

destination is. b) Maximum Sequence: Modify the

sequence held in control messages to the maximal

allowed value. Due to some implementation issues, a

few protocol implementations cannot effectively

detect and purge these “polluted" messages timely so

that they can invalidate all legitimate messages with a

sequence number falling into normal ranges for a

fairly long time

I.Rushing: An offensive that can be carried out

against on-demand routing protocols

J.Wormhole: A tunnel is created between two nodes

that can be utilized to secretly transmit packets.

K.Packet dropping: A node drops data packets

(conditionally or randomly) that it is supposed to

forward.

L.Spoofing: Inject data or control packets with

modified source addresses.

M.Malicious Flooding: Deliver unusually large

amount of data or control packets to the whole

network or some target nodes

IV.WIFI AUTHENTICATION

PROTOCOLS AND WPA BREAKING[7] These protocols are important and provides

fundamental knowledge of the following: i) WiFi

security standards, how they work, where the weak

points are, methods and approaches for hacking

secured WiFi networks; ii) description of the

techniques for password cracking and especially

brute force password cracking; iii) an introduction to

existing tools and algorithms for WPA cracking.

A. WiFi Authentication Protocols[5] : This section

provides an overview of WiFi encryption standards.

These standards are certificated by the WiFi Alliance

much like the devices, which incorporate those

standards. The main reason is interoperability

between all certificated devices. All devices with the

WiFi trademark have been certified by the WiFi

Alliance and meets all the requirements. In these

security standards stand security options like MAC

(Media Access Control) / MAC ID / MAC address

filtering. In the AP (Access Point) the list of MAC

addresses is stored and only clients with a MAC

address in the list are allowed to connect to the AP.

Unfortunately, spoofing any MAC address (i.e.,

making a fake MAC address) is fairly easy. Another

additional option is SSID (Service Set Identification)

disabling. SSID is the identifier of the WLAN

(Wireless LAN) which is broadcasted by the AP in

the beacon frame to enable easy selection of the

WLAN by the user. Disabling the SSID makes the

network invisible for the ordinary users and SSID has

to be set in the client's network manager. However,

there are tools for sniffing the network

communication, which can detect the WLAN with

disabled SSID broadcasting.

Besides the two previously mentioned

mechanisms, some encryption techniques can be

applied to further secure wireless connections. In the

following part of this section, the WEP, WPA and

WPA2 standards are described.

B.WEP Encryption[4][15] : WEP has three

settings: Off (no security), 64-bit (weak security),

128-bit (a bit better security). WEP is not difficult to

crack, and using it reduces performance slightly. If

you run a network with only the default security,

where WEP is turned off, any of your neighbors can

immediately log on to your network and use your

Internet connection. For wireless devices to

communicate, all of them must use the same WEP

setting. (40-bit and 64-bit WEP encryption are the

same thing 40-bit devices can communicate with 64-

bit devices.) While there is no extra performance cost

Pranav S. Ambavkar, Pranit U. Patil, Prof . Pamu Kumar Sw amy / IOSR Journal of

Engineering (IOSRJEN) www .iosrjen.org ISSN : 2250 -3021

Vol. 2 Issue 2, Feb.2012, pp. 320-324

www.iosrjen.org 323 | P a g e

to encrypting the longer key, there is a cost to

transmitting the extra data over the network. 128-bit

security is not much more difficult than 64-bit to

crack, so if you are concerned about performance,

consider using 64-bit. If you're very concerned about

security, use WPA, which replaces WEP with a

protocol that is given current technology, impossible

to crack. The WEP concept of passphrase is

introduced so that you do not have to enter

complicated strings for keys by hand. The passphrase

you enter is converted into complicated keys. Choose

passphrases with the same care you would important

passwords.

 With 128-bit encryption, you need to enter a passphrase to generate each key.

 All four keys must be specified, because WEP switches between them to make your

traffic more difficult to break.

 All devices within your LAN must use the same passphrases (i.e., the same keys).

C. WPA/WPA2 Encryption[7] : WPA stands for

WiFi Protected Access. WPA has been accepted in

2002 as a temporary solution by the WiFi Alliance,

as a response to delayed development of the IEEE

802.11i standard (nowadays known as WPA2) WPA2

has replaced WPA. WPA2, which requires testing

and certification by the Wi-Fi Alliance, implements

the mandatory elements of IEEE 802.11i. In

particular, it introduces CCMP, a new AES-based

encryption mode with strong security.Certification

began in September, 2004; from March 13, 2006,

WPA2 certification is mandatory for all new devices

to bear the Wi-Fi trademark.. WPA2, which offers

government- and enterprise-grade security, is

available in all products that the alliance has anointed

as "WiFi Certified." The security standard replaces

the original WPA and has stronger security than

WPA and other protocols, including WEP (Wired

Equivalent Protocol), which is still an option with

most routers. WEP was introduced in 1997 and was

largely supplanted by WPA and WPA2.

E. WPA-PSK Cracking : It has been found out that

WPA-PSK cracking is the only possible way to crack

this security standard. To successfully crack

WEP/WPA, you first need to be able to set your

wireless network card in "monitor" mode to passively

capture packets without being associated with a

network. This NIC mode is driver-dependent, and

only a relatively small number of network cards

support this mode under Windows. One of the best

free utilities for monitoring wireless traffic and

cracking WEP/WPA-PSK keys is the aircrack-ng

suite, which we will use throughout this article. It has

both Linux and Windows versions (provided your

network card is supported under Windows). The

aircrack-ng site has a comprehensive list of supported

network cards available here: NIC chipset

compatability list.Here we will use aircrack-ng

version 1.0 on a Linux partition (blackbuntu 2) on

Dell Inspiron 4050 laptop, using the built-in Intel

network card.

The aircrack-ng suite is a collection of command-line

programs aimed at WEP and WPA-PSK key

cracking. The ones we will be using are:

airmon-ng - script used for switching the wireless

network card to monitor mode

airodump-ng - for WLAN monitoring and capturing

network packets

aireplay-ng - used to generate additional traffic on the

wireless network

aircrack-ng - used to recover the WEP key, or launch

a dictionary attack on WPA-PSK using the captured

data.

4-Way Handshake is also one of the thing to learn as

it is related to wireless network. The information in

the first two messages are enough for password

cracking. Even though it is enough, it is important to

eavesdrop the whole 4-Way handshake to be sure that

the handshake was successful and that the

information in the first two messages is valid. Host A

sends a TCP SYNchronize packet to Host B, Host B

receives A's SYN, Host B sends a SYNchronize-

ACKnowledgement, Host A receives B's SYN-ACK,

Host A sends ACKnowledge, Host B receives ACK.

TCP socket connection is ESTABLISHED,

SYNchronize and ACKnowledge messages are

indicated by a bit inside the header of the TCP

segment. TCP knows whether the network TCP

socket connection is opening, synchronizing,

established by using the SYNchronize and

ACKnowledge messages when establishing a

network TCP socket connection. When the

communication between two computers ends, another

3-way communication is performed to tear down the

TCP socket connection. This setup and teardown of a

TCP socket connection is part of what qualifies TCP

a reliable protocol. TCP also acknowledges that data

http://en.wikipedia.org/wiki/CCMP
http://en.wikipedia.org/wiki/Advanced_Encryption_Standard
javascript://%20What%20is%20WEP%20?
javascript://%20What%20is%20NIC%20?
http://www.aircrack-ng.org/
http://www.aircrack-ng.org/doku.php?id=compatibility_drivers
http://www.aircrack-ng.org/doku.php?id=compatibility_drivers
http://www.aircrack-ng.org/doku.php?id=compatibility_drivers
javascript://%20What%20is%20WEP%20?
javascript://%20What%20is%20WLAN%20?
javascript://%20What%20is%20WEP%20?
http://www.inetdaemon.com/tutorials/internet/tcp/index.shtml
http://www.inetdaemon.com/tutorials/internet/tcp/segmentation.shtml
http://www.inetdaemon.com/tutorials/internet/tcp/index.shtml
http://www.inetdaemon.com/tutorials/networking/lan/index.shtml
http://www.inetdaemon.com/tutorials/internet/tcp/index.shtml
http://www.inetdaemon.com/tutorials/networking/lan/index.shtml
http://www.inetdaemon.com/tutorials/internet/tcp/index.shtml
http://www.inetdaemon.com/tutorials/computers
http://www.inetdaemon.com/tutorials/internet/tcp/index.shtml
http://www.inetdaemon.com/tutorials/internet/tcp/index.shtml
http://www.inetdaemon.com/tutorials/internet/tcp/index.shtml
http://www.inetdaemon.com/tutorials/basic_concepts/communication/reliable_vs_unreliable.shtml
http://www.inetdaemon.com/tutorials/acronyms_and_terms.shtml#protocol
Pranav S. Ambavkar, Pranit U. Patil, Prof . Pamu Kumar Sw amy / IOSR Journal of

Engineering (IOSRJEN) www .iosrjen.org ISSN : 2250 -3021

Vol. 2 Issue 2, Feb.2012, pp. 320-324

www.iosrjen.org 324 | P a g e

is successfully received and guarantees the data is

reassembled in the correct order.

Fig.4 Way handshaking

a. WPA Cracking Tools : From the time of releasing

WPA there are teams of security experts and hackers,

who try to break it and some developers have even

released tools for cracking WPA.

The list of used HW for this test: AP: D-Link, Client

laptop OS: Blackbuntu2, WiFi card,

Monitoring/capturing: laptop OS: Blackbuntu2, WiFi

card.

IV. CONCLUSION AND FUTURE WORK

Thus we have successfully surveyed the important

terms in the world of Wireless and acknowledged the

important work done in these field. We also have

studied the important attacks and their modus

operandi. The study of authentication protocols led us

to knowledge of WPA breaking and cracking. This

study may lead us to harden our protocol system and

making it resistant to cracking tools. Our future work

will be mainly aimed at simulating various attacks on

WPA by cracking it. Successful simulations will

guide through hardening the present day protocols.

REFERENCES

1. http://en.wikipedia.org/wiki/Wi-Fi

2 .A technical tutorial on IEEE 802.11 protocol by

Pablo Brenner

3.http://www.wifiplanet.com/tutorials/article.php/121

6351

4.http://support.netgear.com/app/answers/detail/a_id/

1141/~/what-is-wep-encryption-for-wireless-

networks%3F

5. WPA password cracking by Master thesis, AAU,

Applied Signal Processing and Implementation

Spring 2009

6. A Practical Message Falsification Attack on

WPA by Toshihiro Ohigashi1 and Masakatu

Morii2 1 Hiroshima University

7. A Survey on Wireless Security protocols

(WEP,WPA and WPA2/802.11i) by ARASH

HABIBI LASHKARI

8. Practical attacks against WEP and WPA by

Martin Beck, TU-Dresden, Germany

9. Enhanced TKIP Michael Attacks by Martin

Beck, TU-Dresden, Germany

10. MAC Layer Anomaly Detection in Ad Hoc

Networks

11. Weakness Analysis and Attack Test for WLAN

by LIU Wu

12. Your 802.11 Wireless Network has No Clothes

William A. Arbaugh

13. Impact of Wireless IEEE802.11n Encryption

Methods on NetworkPerformance of Operating

Systems by Shaneel Narayan

14. New Protocol Design For Wireless Network

Security by Prof. Dr. Gamal Selim

15. Wired Equivalent Privacy (WEP) versus Wi-Fi

Protected Access (WPA) by ARASH HABIBI

LASHKARI

http://en.wikipedia.org/wiki/Wi-Fi
http://www.wifiplanet.com/tutorials/article.php/1216351
http://www.wifiplanet.com/tutorials/article.php/1216351
http://www.wifiplanet.com/tutorials/article.php/1216351
http://support.netgear.com/app/answers/detail/a_id/1141/~/what-is-wep-encryption-for-wireless-networks%3F
http://support.netgear.com/app/answers/detail/a_id/1141/~/what-is-wep-encryption-for-wireless-networks%3F
http://support.netgear.com/app/answers/detail/a_id/1141/~/what-is-wep-encryption-for-wireless-networks%3F

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Accounting & Finance Master
Assignment Helper
High Quality Assignments
ECFX Market
Smart Accountants
Top Class Results
Writer Writer Name Offer Chat
Accounting & Finance Master

ONLINE

Accounting & Finance Master

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$34 Chat With Writer
Assignment Helper

ONLINE

Assignment Helper

I have done dissertations, thesis, reports related to these topics, and I cover all the CHAPTERS accordingly and provide proper updates on the project.

$46 Chat With Writer
High Quality Assignments

ONLINE

High Quality Assignments

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$29 Chat With Writer
ECFX Market

ONLINE

ECFX Market

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$36 Chat With Writer
Smart Accountants

ONLINE

Smart Accountants

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$19 Chat With Writer
Top Class Results

ONLINE

Top Class Results

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$34 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Cheek cell microscope lab answers - Access opening in primary teeth ppt - Dominican province of the assumption - Effective Speaking Discussion - Gould v vaggelas summary - The Rules Of Reality Construction - Safeguard s100 paper shredder - Cherie lunghi nescafe - Human development a lifespan view 8th edition chapter 1 - Q & Q A6 - Subjective and objective data for diabetes mellitus - School canteen healthy eating guidelines - Infant Nutrition - Imi ata online test - The white tooth device company is a manufacturer - Something fishy this way comes - Managerial Accounting - Discussion - Bbc co uk dance mat typing - University of bath campus map - Shoreline stadium case study answers - Visio context diagram examples - Study questions - 3 chemical properties of matter - Essential study skills 8th edition pdf - Effective life of printer - Figs and wasps video - Mkt 571 researching marketing questions - Thomas book sales inc supplies textbooks - Please select the correct sentence from the options below - Great expectations study guide chapters 1 10 answers - Trowbridge hospital x ray - Mental Health - Week 6 Discussion mkt500 - Placatingly in a sentence - Hey brother commercial - Linux paladin - Super size me before and after - Canvas sydney edu au - A manufacturer makes two products doors and windows - Jimmy's terminal key fallout 76 - Tony's art works graph i to iv - Engineering drawing geometric construction - Google's ideological echo chamber pdf - Maintaining portable electrical equipment - Autism daily schedule template - Theme - Offred acts of rebellion - Beyond complete dominance worksheet answers - Six big events of human evolution - Network access protection on or off - What did mae jemison accomplish - App development - Our iceberg is melting 8 steps - Week One Study Guide - How to build a genogram - Professional writing sky marsen pdf - PAD 520 Learning Activity: Monitoring Observed Policy Outcomes - Discussion - Jesus and the spiral of violence - Quality assurance department vodafone - Csi wildlife tracking poachers answer key - Examples of managed care organizations - Real life examples of extension strategies - Amf c90 ball return parts - Ocr criminal law for a2 fourth edition - Waren sports supply balance sheet 2017 - Fredrick Douglas - Chapter 10 e commerce digital markets digital goods quiz - Nursing and Community (Due 24 hours) - Business Plan - Research paper - Assignment 6 - Silkair forward zone seat - Discussion on cultural types - Annika boron and auston matthews - Socrates dialogue with euthyphro - Atomic spectroscopy lab answers - Honeywell fire alarm panel price - Los angeles county chief executive office - Capital budgeting assignment - Discussions(SPORT AND SOCIETY) - Homework market - Acid catalysed dehydration of an alcohol forming an alkene - Plate tectonics lab worksheet answer key - I need this homework by tomorrow afternoon - Words ending in ise - Peng robinson equation of state excel - Emirates annual report 2012 - Calculate the case mix index for this ms drg set - Psychology activities for students - The Role of the RN/APRN in Policy-Making - City of smithville chapter 4 solutions - Time varying electric field - Spark notes a christmas carol - Training foreign language teachers michael j wallace pdf - Assessment - Medicare levy variation declaration - The unit contribution margin is computed by mcq - Social sciences north flinders university - Muhammad legacy of a prophet movie