Social Engineering

Haisler i

WPA: WEP with Band-aids?
Nolan Haisler

CSCE 3550 – Spring 2007

Haisler ii

Table of Contents

Table of Contents …………………………………………………………………………………………………. ii
List of Figures …………………………………………………………………………………………………….. iii
WPA: WEP with Band-aids? ………………………………………………………………………………… 1
1 Wireless Networks ………………………………………………………………………………………… 1
2 WEP/WPA/WPA2 and the IEEE 802.11 Specification………………………………………. 1

2.1 Data Frames ………………………………………………………………………………………….. 2
2.2 Typical Encryption Modes………………………………………………………………………. 3

3 WPA’s Modifications to Patch WEP’s Vulnerabilities ………………………………………. 3
3.1 Authentication of Management Frames…………………………………………………….. 3

3.1.1 WEP: No Authentication of Management Frames ……………………………… 3
3.1.2 WPA Protocol Modification …………………………………………………………….. 4

3.2 Message Integrity Check…………………………………………………………………………. 4
3.2.1 WEP: Weak Message Integrity Check………………………………………………. 4
3.2.2 WPA Protocol Modification …………………………………………………………….. 4

3.3 Replay Protection…………………………………………………………………………………… 5
3.3.1 WEP: No Replay Protection ……………………………………………………………. 5
3.3.2 WPA Protocol Modification …………………………………………………………….. 5

3.4 IV Collisions, Challenge/Response, and Key Generation ……………………………. 6
3.4.1 WEP: IV Collisions ……………………………………………………………………….. 6
3.4.2 WEP: Challenge/Response Authentication reveals PRGA…………………… 7
3.4.3 WEP: Encryption Key is Reversible from Ciphertext …………………………. 8
3.4.4 WPA Protocol Modification …………………………………………………………….. 9

4 Tools to Exploit WEP/WPA Weaknesses……………………………………………………….. 13
4.1 WEP Attack – Recovering the PSK with AirCrack-ng ……………………………… 14

4.1.1 Basic WEP-PSK Attack Approach ………………………………………………….. 14
4.1.2 Attack Setup…………………………………………………………………………………. 14
4.1.3 WEP Packet Capture and Traffic Acceleration …………………………………. 16
4.1.4 Cracking the PSK………………………………………………………………………….. 17

4.2 WPA Attack – Recovering the PSK ……………………………………………………….. 18
4.2.1 Basic Attack Approach ………………………………………………………………….. 18
4.2.2 Capture Handshake ……………………………………………………………………….. 18
4.2.3 Offline Dictionary Attack ………………………………………………………………. 19

5 Conclusion …………………………………………………………………………………………………. 21
Useful Tools for Exploiting WEP/WPA………………………………………………………………… 22
Bibliography ……………………………………………………………………………………………………… 23

Haisler iii

List of Figures

Figure 1: Typical Wireless Configuration [16]………………………………………………………… 1
Figure 2: Unencrypted Data Frame [1] …………………………………………………………………… 2
Figure 3: WEP Encryption Enabled [1] ………………………………………………………………….. 2
Figure 4: WPA Encryption Enabled [2]………………………………………………………………….. 2
Figure 5: MIC Counter Measures [2]……………………………………………………………………… 5
Figure 6: WPA Replay Protection using Counters [2]………………………………………………. 6
Figure 7: Exploiting IV Collisions…………………………………………………………………………. 7
Figure 8: WEP Encryption [9] ………………………………………………………………………………. 8
Figure 9: 4 Way Handshake and Key Generation ………………………………………………….. 10
Figure 10: Graphical Representation of WPA Encryption ………………………………………. 12
Figure 11: BackTrack v2 802.11 Attack Tools………………………………………………………. 13
Figure 12: Basic Attack with AirCrack [12]………………………………………………………….. 14
Figure 13: Configuring Wireless Interface ……………………………………………………………. 15
Figure 14: Finding the Neighbor’s Network………………………………………………………….. 16
Figure 15: Packet Capture…………………………………………………………………………………… 17
Figure 16: Cracking the WEP PSK………………………………………………………………………. 17
Figure 17: Successful WEP Attack………………………………………………………………………. 18
Figure 18: Capturing Handshake …………………………………………………………………………. 19
Figure 19: Attempting to Force a Handshake ………………………………………………………… 19
Figure 20: Kick off Offline Dictionary Attack ………………………………………………………. 20
Figure 21: Successful WPA-PSK Attack………………………………………………………………. 20

Haisler 1

WPA: WEP with Band-aids?

1 Wireless Networks
Wireless IEEE 802.11 networks are constantly increasing in popularity and are showing
up everywhere, even at coffee shops. The real advantage of a wireless network is the
mobility it provides due to the fact that clients do not need to be physically connected to
the network. Wireless networks are typically used to extend an existing wired network.
The most typical home setup is shown in Figure 1 where clients communicate to hosts on
the wired network (an Internet) through a hardware access point. Since any packet that is
sent in the air waves is received by any host that is in range, each access point is assigned
a Basic Service Set Identifier (BSSID). The access points and its clients use the BSSID
to filter out extraneous packets that are intended for other networks. In addition, due to
the fact that any host within range can see any packet transmitted, 802.11 included the
Wired Equivalency Protocol (WEP) to provide confidentiality to the traffic between a
host and the access point.. However, WEP was soon found to be a poor encryption
protocol that spurned several appendices to be added to the 802.11 specification to solve
the problem of providing confidentiality over a wireless network. This paper seeks to
give a discussion of various weaknesses and insecurities found in the WEP protocol,
WPA’s modification to the protocol to address these vulnerabilities, and a conclusion of
WPA’s effectiveness. Lastly, the author captures the simplicity of using today’s tools to
attack WEP-PSK and WPA-PSK.

Figure 1: Typical Wireless Configuration [16]

2 WEP/WPA/WPA2 and the IEEE 802.11 Specification
Wireless Equivalent Privacy (WEP) is specified in the IEEE 802.11-1997 specification as
a method to provide confidentiality for wireless networks similar to the level of
confidentiality found on wired networks. At the heart of the WEP protocol is the RC4
algorithm which is used to encrypt the payload of data packets. Unfortunately, WEP was
poorly designed and today only provides casual security. In response to WEP’s serious
security weaknesses, the 802.11i specification was drafted. In order to provide a WEP
replacement quickly, the Wi-Fi Alliance (an industry trade group) implemented a subset

Haisler 2

of the 802.11i before it was ratified. The protocol was named Wi-Fi Protected Access
(WPA) and was based on Draft 3 of 802.11i. The focus of WPA centered around
creating a new encryption mechanism that would improve confidentiality while utilizing
the existing WEP hardware. The Wi-Fi alliance decided to trade a complete specification
rewrite, and perhaps a more secure protocol, for the benefit of designing WPA such that
it could be deployed to most existing wireless systems via a firmware/software upgrade.

WPA2 implements the full 802.11i standard which includes the features of WPA as well
as support for AES and CCMP. WPA2 requires a full hardware upgrade in most
instances.

2.1 Data Frames
Both WEP and WPA only encrypt the payload of data packets. They do not encrypt
management packets (used for beaconing, network probes, and authentication), control
packets (used to ACK the receipt of data packets) or the header information in data
packets (used to encapsulate IP/ARP/etc. packets) [1]. Figures 2, 3, and 4 depict the
layout of an unencrypted 802.11 frame, layout of a 802.11 frame with WEP enabled, and
the frame layout with WPA enabled respectively. Notice the 3 additions to the frame in
Figure 3: the Initialization Vector (IV), the Index, and the Integrity Check Value (ICV)
[1]. The payload and the ICV are encrypted while the rest of the frame is plaintext. The
WPA protocols adds another 12 bytes to the WEP data frame – 4 bytes for an extended
IV and 8 bytes for a message integrity check (MIC).

Figure 2: Unencrypted Data Frame [1]

Figure 3: WEP Encryption Enabled [1]

Figure 4: WPA Encryption Enabled [2]

Haisler 3

2.2 Typical Encryption Modes
The authentication mechanism for WEP and WPA comes in two varieties – Enterprise,
and Pre-Shared-Key mode. In Enterprise mode, users are authenticated via an 802.1X
authentication server (such as an RADIUS server) and the base encryption key is
exchanged between the access point and the wireless client during the authentication
process. Note that 802.1X is written into the WPA standard while WEP only supports
802.1X via vendor specific proprietary designs (not all WEP implementations support
802.1X). The mode, Pre-Shared-Key (PSK), is the focus of this paper. The PSK mode is
utilized when a 802.1X server is unavailable, such as in a small office or home
environment, and requires the administrator/user to manually type the pre-shared key into
the access point configuration as well as all of the wireless clients. One additional feature
only implemented in the WEP standard is challenge/response. The challenge/response
mode was intended to provide an authentication mechanism between the access point and
the wireless client.

3 WPA’s Modifications to Patch WEP’s Vulnerabilities
Since the inception of WEP, numerous vulnerabilities have been discovered. Discussed
in the next sections are some of the problems that plague 802.11 and WEP as well as
WPA’s approach to close the security holes.

3.1 Authentication of Management Frames

3.1.1 WEP: No Authentication of Management Frames
Management frames are used in 802.11 for tasks such as beaconing (discovering wireless
networks), authentication and de-authentication. Since the source of management frames
are not authenticated, wireless networks are exposed to spoofing and Denial of Service
(DoS) attacks. An attacker can mount an effective DoS attack against an entire network
by impersonating an access point and repeatedly sending de-authentication frames to the
broadcast address with the impersonated access point’s BSSID. All of the clients
receiving the de-authentication packets (thinking they were actually from the access
point) will continually be knocked off the network. Another attack involves an attacker
flooding the access point with spoofed authentication request packets. Less well
designed access points will become overwhelmed (such as when the association table
overflows) and crash [15]. Lastly, like wired networks, 802.11 is susceptible to MAC
address spoofing attacks. Many access point vendors implement a rudimentary
authentication mechanism based on MAC address white listing. Clients with MAC
addresses that are listed in the access point’s white list are allowed to connect to the
access point while all other client MAC addresses are denied access [19]. Because
management frames are not authenticated, an attacker can sniff the wireless network and
capture another clients MAC address that is on the white list (MAC address are sent as
plaintext even with WEP enabled, see Figure 3). The attacker can then send a de-
authentication management frame to the client with the white-listed MAC address and
then impersonate that client (by spoofing that client’s MAC address) and connect to the
access point. The attacker is allowed to connect because his spoofed MAC address is in
the access point’s white list.

Haisler 4

3.1.2 WPA Protocol Modification
Management frames are not authenticated in WPA and are still vulnerable.

3.2 Message Integrity Check

3.2.1 WEP: Weak Message Integrity Check
Message integrity checking is accomplished via the 4 byte Integrity Check Value (see
figure 3). Since the Integrity Check Value (ICV) is calculated using CRC32, the
maximum number of different checksums is 2^32 = 4,294,967,296. CRC32 is a poor
cryptographic hash because with only 32 bits to provide uniqueness, the rate of collisions
is high. Another problem with CRC is due to the fact that the checksum calculation is
linear and can be abused. A well known WEP/wireless guru by the name of KoreK has
determined an algorithm that can be used to modify any bit in a encrypted packet while
maintaining the packet’s ICV. After modifying the encrypted payload, the algorithm re-
calculates the required bits needed to replace the encrypted ICV such that when the
packet is decrypted, the message integrity check will be successful [10]. An even more
impressive attack developed by KoreK involves abusing the message integrity check to
decrypt a packet without knowing the encryption key. The attack works by removing 1
byte from the encrypted plaintext and then re-calculating the ICV. The packet is sent out
on the network and monitored to see if it is accepted or denied (denied because the
received ICV did not match the calculated ICV) by the access point. A relationship was
found by KoreK between the truncated byte and the value used to turn the truncated
message into a valid packet [10]. Thus, the access point can be used as a decoder with a
maximum of 2^8 (1 byte) = 255 packets sent for each byte that is to be decrypted [17].
The application Chopchop, written by KoreK, implements the weak ICV vulnerability
and allows an attacker to recover the plaintext of a packet, byte by byte.

3.2.2 WPA Protocol Modification
WPA’s answer to the weak message integrity check (MIC) in WEP is Michael. The
Michael algorithm produces a 64-bit cryptographic hash of the packet using a shared 64-
bit key (derivation of the MIC key is discussed later). As shown in figure 4, Michael
does not replace the ICV but augments it. The receiver of the frame calculates the same
cryptographic hash to verify the packet contents have not been modified. However, due
to the design constraint that WPA should be able to run using the processing power
available on all previous WEP enabled NICs, the level of security in the hash was
reduced. Michael only provides 29 bits of security (2^29 combinations). Assuming an
11 Mbps network and a 50% probability, an attacker could guess the MIC in ~2 minutes.

In order to prevent abuse of the MIC, the 802.11i specification requires an access point
that receives more than 2 packets with an invalid MIC in 60 seconds to 1) de-authenticate
all users, 2) shutdown for 60 seconds, 3) re-authenticate all users [2]. Although this
approach is effective at slowing down the attack, it could also be used to implement a
DOS attack on the network. Figure 6 from the 802.11i specification graphically depicts
the MIC countermeasures.

Haisler 5

Figure 5: MIC Counter Measures [2]

3.3 Replay Protection

3.3.1 WEP: No Replay Protection
When a packet is received, the only check to determine if the packet is valid or not is the
computation and comparison of the ICV (see Figure 6). If the computed ICV does not
match the received ICV, the packet is dropped. Otherwise, the packet is processed. No
mechanism exists to ensure that a packet has not already been observed on the network.
For example, a single IV can be reused over and over and is not required by the WEP
specification to be unique per packet. Thus an attacker can capture any traffic from the
network and then replay that traffic back onto the network [7]. If WEP is enabled, the
payload contents of the packet are unknown to the attacker but the packets can still be
replayed. However, an attacker can identify some traffic by observing unique
characteristics such as a packet’s data length and address information (for example ARP
or DHCP packets). The real problem with the fact that 802.11 does not implement replay
protection is seen later when it is exploited by giving the attacker the ability to repeatedly
insert an arbitrary packet onto the network.

3.3.2 WPA Protocol Modification
WPA adds a completely new mechanism to the 802.11 protocol to prevent replay attacks.
This mechanism is the TKIP Sequence Counter (TSC). The TSC is a 48-bit counter that
is transmitted in the clear with each packet. See figure 5 for the location of the TSC
(TSC0 – TSC5) in a transmitted packet. The TSC starts at 0 and is incremented by 1 for
every packet transmitted. Each receiver (access point and wireless client) keeps track of
the highest TSC value that it has received from a particular MAC address and will drop
any incoming packet from that MAC address that has a TSC value less than or equal to
the stored TSC value. Note that packets must be received in order (creates problems with
QoS) due to the requirement that each packet’s TSC value must be greater than the

Haisler 6

packet that preceded it [3]. A receiver only updates the TSC counter it is caching to the
received packet’s TSC counter if the ICV/MIC checks pass.

Figure 6: WPA Replay Protection using Counters [2]

Two potential attacks to the TSC mechanism are remedied by the ICV and MIC checks.
The first attack involves attempting to replay packets onto the network by capturing a
packet, incrementing the TSC (remember the TSC is transmitted in the clear) and then re-
broadcasting the packet onto the network. The attack fails because the TSC is used as
input to the packet decryption key. Thus when the MIC and ICV are decrypted, the
calculated ICV/MIC will not match the received ICV/MIC values and the packet will be
dropped. The second attack involves an attempted DoS attack by transmitting (or
modifying a packet and re-transmitting) a packet with the TSC set to a significantly
higher value [3]. As above, receivers are protected from such packets by the ICV/MIC
checks. The packet decryption will be garbled and the packet will be dropped.

3.4 IV Collisions, Challenge/Response, and Key Generation

3.4.1 WEP: IV Collisions
Most vendors of 802.11 wireless products that support WEP advertise that the product
supports 64-bit or 128-bit keys. Although the encryption algorithm in WEP does indeed
use a key of 64 or 128 bits, the effective length of the key for confidentiality is really 40-
bit or 104-bit respectively. The reason for the discrepancy is in the way keys are
generated in the WEP specification. Each key consists of two parts: the shared secret key
(40-bit or 104-bit) and the IV (24-bit). The shared secret key is appended to the IV to
create the key used in the encryption algorithm. However, the IV is not secret and is
transmitted as plaintext with every encrypted data packet (see IV in Figure 3). Thus, for
every encrypted data packet, 24-bits of the encryption key are known.

Since the shared secret key is always 1 of 4 keys, the IV part of the encryption key is
used so that a unique encryption key is available for each packet. The IEEE 802.11
specification does not define IV selection criteria [1]. Thus, most vendors simply
implement a sequential (big-endian or little-endian) counter for IV selection that starts at

Haisler 7

x00:00:00 for the first packet and wraps at xFF:FF:FF. A few vendors implement a
random IV generator that filters out “weak IVs” (weak IVs are discussed later).

It is very important in WEP that Initialization Vectors (IV) are never reused because they
are the only piece of the encryption key that is unique. Figure 7 shows how plaintext2
can be revealed if plaintext1 is known and both messages are encrypted with the same
encryption key (which results in the same PRGA output) [13]. The plaintext of certain
encrypted well known packets, such as ARP or DHCP packets, can be guessed by
observing packet size and header information. When these packets are found, they can be
used to decrypt other packets encrypted with the same IV. A single DHCP packet
provides enough information to decrypt most of the TCP/IP header of any other packet
encrypted with the same IV [11].

Figure 7: Exploiting IV Collisions

The chances of IV collisions are statistically high. Since the IV is only 24 bits in length,
the total possible unique IVs is 2^24 = 16,777,216. Applying the Birthday paradox (in a
group of 23 people, there is a 50% chance 2 people will have the same birthday), the
probability of IV collision is 50% after only 4,823 frames (approximately 2^12) [11].

An insertion attack can also be carried out if an attacker knows the ciphertext and
matching plaintext of a packet. They can XOR the ciphertext and plaintext together to
produce a valid keystream (PRGA). The attacker can then insert any arbitrary packet
they desire on the network encrypting it with the valid keystream. The packet will be
encrypted correctly — all without knowing the shared secret key!

3.4.2 WEP: Challenge/Response Authentication reveals PRGA
802.11 supports two types of WEP networks: open and closed (shared). The open
configuration allows any client to connect to the access point as long as the client sends
properly encrypted (ICV check passes) packets. The closed configuration requires clients
to perform basic authentication through a challenge/response mechanism before
connecting to the access point. In the closed configuration, the client requests connection
to the access point, and the access point replies with a 128 byte challenge. The challenge
is random data which is sent unencrypted to the client. The client then encrypts the
challenge and sends the result (the response) to the access point. The access point

Haisler 8

decrypts the received response from the client and compares the known challenge
plaintext with the decrypted response plaintext. If the plaintext matches, the client is
assumed to know the shared secret key and is allowed to logon to the network [6].

The problem with closed networks is that the challenge/response authentication exchange
can be used to generate 128 bytes of valid keystream (PRGA). All an attacker needs to
do is sniff the challenge/response authentication packets.

Challenge (plaintext) XOR Response (ciphertext) = valid keystream/PRGA

With a valid keystream, an attacker can now transmit arbitrary packet contents without
knowledge of shared secret key [18].

3.4.3 WEP: Encryption Key is Reversible from Ciphertext
Encryption is straight forward for WEP. The 24-bit IV is combined with the 40 or 104
bit shared secret key to create the encryption key. The encryption key is used in the RC4
Key Scheduling Algorithm (KSA) to generate the pseudo random state array. The RC4
Psuedo Random Generation Algorithm (PRGA) uses the pseudo random state array
generated by the KSA to create a streaming key. Meanwhile, a 32-bit Cyclic
Redundancy Checksum (CRC) is calculated from the plaintext to be transmitted. The
CRC is appended to the plaintext as the ICV. The plaintext/ICV data is then encrypted
by XORing it with the streaming key [9]. See Figure 8 for a graphical representation of
WEP encryption.

Figure 8: WEP Encryption [9]

Fluhrer, Mantin, and Shamir (FMS) in their paper “Key Scheduling Weaknesses in RC4
Algorithm” discuss an attack against RC4 based on a subset of IVs that are considered
“weak.” WEP in particular is vulnerable to the FMS attack due to the way WEP
implements RC4 [20]. The FMS “paper showed that the first byte of a subset of IVs
(deemed “weak”) could be correlated with individual bytes of the secret key at a
probability of 5%” [14]. Thus, to mount an FMS attack, an attacker would sniff the
network traffic collecting as many packets as possible that use weak IVs (and the same
shared secret key), and then analyze the packets using the methods discussed in the FMS

Haisler 9

paper to derive the encryption key. Once the encryption key is known, the shared secret
key is known (because the IV is plaintext).

3.4.4 WPA Protocol Modification
The security vulnerability in WEP created by the Challenge/Response authentication is
eliminated in WPA. Instead of using the Challenge/Response protocol, WPA supports
802.1X authentication. IV collisions and the recoverability of the encryption key are
mitigated by a new key generation protocol called Temporal Key Integrity
Protocol(TKIP). TKIP is still based on RC4 but brings to the table several new features.
Instead of creating the RC4 encryption key by combining the IV and the pre-shared key
(PSK), TKIP uses the PSK along with several mixing functions to create the encryption
key. The TKIP key generation protocol mitigates all known key attacks by either making
the attack irrelevant or impractical.

In WPA-PSK, TKIP begins with a PSK (8 – 63 ASCII characters in length) that has been
entered manually into each access point (AP) and each client (C). The PSK is used to
generate a 256 bit Pairwise Master Key (PMK) which in turn is used to generate a 512-bit
Pairwise Transient Key (PTK). PMK is calculated using the Password-Based Key
Derivation Function v2 (PBKDF2) as follows:

PMK[256-bit]= PBKDF2(PSK, SSID, SSID length, 4069, 256)

After both the client and the access point have the PMK, the four way handshake occurs.
See Figure 9 for a graphical depiction of the handshake. The access point initiates the
handshake by sending a random number (ap-nonce) and his MAC address (ap-MAC) to
the client. After receiving the information from the access point and generating a random
number, the client now has the necessary information to calculate the PTK. PTK is
calculated as follows where PRGF is a pseudo-random generator function based on
HMAC-SHA1.

PTK[512-bit]= PRGF(PMK, “Pairwise Key Expansion”, ap-MAC, c-MAC, ap-
nonce, c-nonce)

After determining the PTK, the client responds with his random number (c-nonce), MAC
address (c-MAC) and a MIC calculated using the EAPOL-Key.

Upon receiving the ap-nonce and ap-MAC, the access point calculates the PTK, validates
the MIC and then transmits a starting sequence number and a MIC. The client validates
the MIC received from the access point and then responds with an acknowledgement and
a MIC.

At the completion of the handshake, each party has determined the PTK and verified that
the opposite party has knowledge of the PMK (by verifying the MIC) [4]. The PTK is
broken into 4 separate keys as shown at the bottom of Figure 9.

Haisler 10

Figure 9: 4 Way Handshake and Key Generation

Once the PTK is shared between the client and the access point, the encryption algorithm
shown in Figure 10 is used to handle data packets. Notice that WEP is still used in TKIP.
The shaded gray area of Figure 10 represents the original WEP specification, while the
peach shaded area includes the parts added by TKIP.

TKIP starts in Phase 1 by mixing the 32 most significant bits of the TKIP Sequence
Counter (TSC) with the transmitters address and the Temporal Encryption Key (TEK) to
produce an 80 bit intermediate key (TTAK). For each data packet that is sent, the 16
least significant bits of the TSC are incremented by 1 to produce a unique WEP Seed key.
To prevent IV collisions with the same key, when TSC0 and TSC1 rollover, TSC5-TSC2
are incremented by 1 which in turn updates the TTAK (updating the TTAK generates a
new key for the 104-bit part of the WEP key and thereby eliminates IV collisions) [2].
Phase 2 the TKIP encryption protocol …

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Open chat
1
You can contact our live agent via WhatsApp! Via + 1 929 473-0077

Feel free to ask questions, clarifications, or discounts available when placing an order.

Order your essay today and save 20% with the discount code GURUH