Wardriving, exploitation and mitigation of security-encrypted wireless networks
Loading...
Supplementary material
Other Title
Authors
Marwah, H.
Shah, G.
David, Andrew
Shah, G.
David, Andrew
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2022-12-09
Supervisors
Type
Conference Contribution - Oral Presentation
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
wireless networks
cyber attacks
passwords
hacking
cybersecurity education
cyber attacks
passwords
hacking
cybersecurity education
ANZSRC Field of Research Code (2020)
Citation
Marwah, H., Shah, G., & David, A. (2022, December, 8-9). Wardriving, exploitation and mitigation of security-encrypted wireless networks [Paper presentation]. Rangahau: Te Mana o te Mahi Kotahitanga: Research: The Power of Collaboration, MIT/Unitec Research Symposium 2022, Te Pūkenga, New Zealand, Auckland, New Zealand. https://hdl.handle.net/10652/6026
Abstract
Problem:
how secure the wireless networks are? ; What can we do to make end users savvy about wireless security?
Implementation:
powerback, GPS dongle, Raspberry Pi 3B+, Alfa adapter
Ethical issues
Legislation
Wardriving
Total access points captured
Data captured 2015-2021
ARP replay attack
Evil twin
Recommendations
Password brute-force attack timeline
Run awareness advertisements
Keep WPS option disabled in router configuration
Publisher
Permanent link
Link to ePress publication
DOI
Copyright holder
Authors
Copyright notice
All rights reserved