Přístupnostní navigace
E-application
Search Search Close
Publication detail
VONDRÁČEK, M. PLUSKAL, J. RYŠAVÝ, O.
Original Title
Automated Man-in-the-Middle Attack Against Wi-Fi Networks
Type
journal article in Web of Science
Language
English
Original Abstract
Currently used wireless communication technologies suffer security weaknesses that can be exploited allowing to eavesdrop or to spoof network communication. In this paper, we present a practical tool that can automate the attack on wireless security. The developed package called wifimitm provides functionality for the automation of MitM attacks in the wireless environment. The package combines several existing tools and attack strategies to bypass the wireless security mechanisms, such as WEP, WPA, and WPS. The presented tool can be integrated into a solution for automated penetration testing. Also, a popularization of the fact that such attacks can be easily automated should raise public awareness about the state of wireless security.
Keywords
Man-in-the-Middle attack, accessing secured wireless networks, password crack- ing, dictionary personalization, tampering network topology, impersonation, phishing
Authors
VONDRÁČEK, M.; PLUSKAL, J.; RYŠAVÝ, O.
Released
31. 3. 2018
ISBN
1558-7215
Periodical
The Journal of Digital Forensics, Security and Law
Year of study
2018
Number
13
State
United States of America
Pages from
59
Pages to
80
Pages count
22
URL
https://commons.erau.edu/jdfsl/vol13/iss1/9/
BibTex
@article{BUT155048, author="Martin {Vondráček} and Jan {Pluskal} and Ondřej {Ryšavý}", title="Automated Man-in-the-Middle Attack Against Wi-Fi Networks", journal="The Journal of Digital Forensics, Security and Law", year="2018", volume="2018", number="13", pages="59--80", doi="10.15394/jdfsl.2018.1495", issn="1558-7215", url="https://commons.erau.edu/jdfsl/vol13/iss1/9/" }
Documents
Automated Man-in-the-Middle Attack Against Wi-Fi Networks.pdf