2016
DOI: 10.1051/itmconf/20160703001
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Network Penetration Testing and Security Auditing

Abstract: Abstract-IEEE802.11 wireless wireless networks have security issues that are vulnerable to a variety of attacks. Due to using radio to transport data, attackers can bypass firewalls, sniff sensitive information, intercept packets and send malicious packets. Security auditing and penetration testing is expected to ensure wireless networks security. The contributions of this work are analyzed the vulnerability and types of attacks pertaining to IEEE 802.11 WLAN, performed well known attacks in a laboratory envir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…Furthermore, re-attack the network that has been applied anticipation. From all the processes that have been carried out, we will get the overall results of each testing process (Wang et al, 2016).…”
Section: Methodsmentioning
confidence: 99%
“…Furthermore, re-attack the network that has been applied anticipation. From all the processes that have been carried out, we will get the overall results of each testing process (Wang et al, 2016).…”
Section: Methodsmentioning
confidence: 99%
“…According to Wang et al security testing and auditing can minimize the risk and threats of a computer system (Wang, Wang, Feng, & Pan, 2016). Mohamed et al designed and developed a security auditing tool called SAT (Security Administration Tool) and tested it on three common operating systems (Windows 95/98/NT/2000, Linux, and Solaris) to find their weakness and vulnerabilities.…”
Section: Related Workmentioning
confidence: 99%
“…To perform data detection, Aicrack-ng and Airodump-ng were used (Cunche, 2014). To further encourage the use of Wi-Fi at the bus stop, an Access Point was created with Airbase-ng (Wang et al, 2016), so that users could connect to a network. All data were stored on the MicroSD card and uploaded to the cloud at the same time so that the data could be analyzed in real time.…”
Section: Detec8on Devicementioning
confidence: 99%