Detail publikačního výsledku

Automated Man-in-the-Middle Attack Against Wi-Fi Networks

VONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O.

Original Title

Automated Man-in-the-Middle Attack Against Wi-Fi Networks

English Title

Automated Man-in-the-Middle Attack Against Wi-Fi Networks

Type

WoS Article

Original Abstract

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated should raise public awareness about the state of wireless security.

English abstract

Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated should raise public awareness about the state of wireless security.

Keywords

Man-in-the-Middle attack, accessing secured wireless networks, password crack-
ing, dictionary personalization, tampering network topology, impersonation, phishing

Key words in English

Man-in-the-Middle attack, accessing secured wireless networks, password crack-
ing, dictionary personalization, tampering network topology, impersonation, phishing

Authors

VONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O.

RIV year

2019

Released

31.03.2018

Book

Journal of Digital Forensics, Security and Law

ISBN

1558-7215

Periodical

Journal of Digital Forensics Security and Law

Volume

2018

Number

13

State

United States of America

Pages from

59

Pages to

80

Pages count

22

URL

Full text in the Digital Library

BibTex

@article{BUT155048,
  author="Martin {Vondráček} and Jan {Pluskal} and Ondřej {Ryšavý}",
  title="Automated Man-in-the-Middle Attack Against Wi-Fi Networks",
  journal="Journal of Digital Forensics Security and Law",
  year="2018",
  volume="2018",
  number="13",
  pages="59--80",
  doi="10.15394/jdfsl.2018.1495",
  issn="1558-7215",
  url="https://commons.erau.edu/jdfsl/vol13/iss1/9/"
}

Documents