Přístupnostní navigace
E-application
Search Search Close
Detail publikačního výsledku
VONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O.
Original Title
Automated Man-in-the-Middle Attack Against Wi-Fi Networks
English Title
Type
WoS Article
Original Abstract
Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated should raise public awareness about the state of wireless security.
English abstract
Keywords
Man-in-the-Middle attack, accessing secured wireless networks, password crack-ing, dictionary personalization, tampering network topology, impersonation, phishing
Key words in English
Authors
RIV year
2019
Released
31.03.2018
Book
Journal of Digital Forensics, Security and Law
ISBN
1558-7215
Periodical
Journal of Digital Forensics Security and Law
Volume
2018
Number
13
State
United States of America
Pages from
59
Pages to
80
Pages count
22
URL
https://commons.erau.edu/jdfsl/vol13/iss1/9/
Full text in the Digital Library
http://hdl.handle.net/
BibTex
@article{BUT155048, author="Martin {Vondráček} and Jan {Pluskal} and Ondřej {Ryšavý}", title="Automated Man-in-the-Middle Attack Against Wi-Fi Networks", journal="Journal of Digital Forensics Security and Law", year="2018", volume="2018", number="13", pages="59--80", doi="10.15394/jdfsl.2018.1495", issn="1558-7215", url="https://commons.erau.edu/jdfsl/vol13/iss1/9/" }
Documents