2016
DOI: 10.1051/itmconf/20160703001
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Network Penetration Testing and Security Auditing

Abstract: Abstract-IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory envir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 9 publications
(5 reference statements)
0
3
0
Order By: Relevance
“…According to Wang et al security testing and auditing can minimize the risk and threats of a computer system (Wang, Wang, Feng, & Pan, 2016). Mohamed et al designed and developed a security auditing tool called SAT (Security Administration Tool) and tested it on three common operating systems (Windows 95/98/NT/2000, Linux, and Solaris) to find their weakness and vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…According to Wang et al security testing and auditing can minimize the risk and threats of a computer system (Wang, Wang, Feng, & Pan, 2016). Mohamed et al designed and developed a security auditing tool called SAT (Security Administration Tool) and tested it on three common operating systems (Windows 95/98/NT/2000, Linux, and Solaris) to find their weakness and vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…To perform data detection, Aicrack-ng and Airodump-ng were used (Cunche, 2014). To further encourage the use of Wi-Fi at the bus stop, an Access Point was created with Airbase-ng (Wang et al, 2016), so that users could connect to a network. All data were stored on the MicroSD card and uploaded to the cloud at the same time so that the data could be analyzed in real time.…”
Section: Detec8on Devicementioning
confidence: 99%
“…The security study of the WEP algorithm was performed by Vilas Deotare [10]. Wang, S., Wang, J., Feng, C., & Pan have perform analyzing the vulnerabilities and types of attacks on IEEE 802.11 WLAN [14]. IEEE 802.11 is a wireless network which uses radio to transfer data and hence is most susceptible to the security issues such as WPE/WPA/WPA2 cracking, Denial of Service (DoS), and rouge access points [14].…”
Section: Related Workmentioning
confidence: 99%