Wardriving, exploitation and mitigation of security-encrypted wireless networks

Loading...
Thumbnail Image

Supplementary material

Other Title

Authors

Marwah, H.
Shah, G.
David, Andrew

Author ORCID Profiles (clickable)

Degree

Grantor

Date

2022-12-09

Supervisors

Type

Conference Contribution - Oral Presentation

Ngā Upoko Tukutuku (Māori subject headings)

Keyword

wireless networks
cyber attacks
passwords
hacking
cybersecurity education

ANZSRC Field of Research Code (2020)

Citation

Marwah, H., Shah, G., & David, A. (2022, December, 8-9). Wardriving, exploitation and mitigation of security-encrypted wireless networks [Paper presentation]. Rangahau: Te Mana o te Mahi Kotahitanga: Research: The Power of Collaboration, MIT/Unitec Research Symposium 2022, Te Pūkenga, New Zealand, Auckland, New Zealand. https://hdl.handle.net/10652/6026

Abstract

Problem: how secure the wireless networks are? ; What can we do to make end users savvy about wireless security? Implementation: powerback, GPS dongle, Raspberry Pi 3B+, Alfa adapter Ethical issues Legislation Wardriving Total access points captured Data captured 2015-2021 ARP replay attack Evil twin Recommendations Password brute-force attack timeline Run awareness advertisements Keep WPS option disabled in router configuration

Publisher

Link to ePress publication

DOI

Copyright holder

Authors

Copyright notice

All rights reserved

Copyright license

Available online at

This item appears in: