Wardriving, exploitation and mitigation of security-encrypted wireless networks

Loading...
Thumbnail Image
Supplementary material
Other Title
Authors
Marwah, H.
Shah, G.
David, Andrew
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2022-12-09
Supervisors
Type
Conference Contribution - Oral Presentation
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
wireless networks
cyber attacks
passwords
hacking
cybersecurity education
ANZSRC Field of Research Code (2020)
Citation
Marwah, H., Shah, G., & David, A. (2022, December, 8-9). Wardriving, exploitation and mitigation of security-encrypted wireless networks [Paper presentation]. Rangahau: Te Mana o te Mahi Kotahitanga: Research: The Power of Collaboration, MIT/Unitec Research Symposium 2022, Te Pūkenga, New Zealand, Auckland, New Zealand. https://hdl.handle.net/10652/6026
Abstract
Problem: how secure the wireless networks are? ; What can we do to make end users savvy about wireless security? Implementation: powerback, GPS dongle, Raspberry Pi 3B+, Alfa adapter Ethical issues Legislation Wardriving Total access points captured Data captured 2015-2021 ARP replay attack Evil twin Recommendations Password brute-force attack timeline Run awareness advertisements Keep WPS option disabled in router configuration
Publisher
Link to ePress publication
DOI
Copyright holder
Authors
Copyright notice
All rights reserved
Copyright license
Available online at
This item appears in: