Structure and Logic of the Evil Twin Attack in the context of Open Source Software
[ 1 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Instytut Sieci Teleinformatycznych, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ DW ] doktorant wdrożeniowy | [ S ] student | [ P ] pracownik
2023
rozdział w monografii naukowej / referat
angielski
- evil twin
- wireless LAN
- MITM (Man in the Middle)
- WLAN Security
EN This article provides an analysis of an attack on wireless networks referred to as Evil Twin. In addition to a theoretical description, the article discusses the hardware and system combination used, while pointing out its relatively low complexity, and the complimentary nature of the solutions used, both the operating system and the software used are presented. This clearly translates into the potential when attempting to break through security and gain specific data. Furthermore, the authors present the individual phases of the attack, including the proposed subsequent optimisations, in order to make the attack practically applicable in most cases, regardless of the location and shape of the network under investigation. The paper additionally presents methods for tuning the functionality itself, in order to ultimately increase the probability of success of the attack itself. The article is the result of work devoted to reviewing the literature on the subject and conducting experiments with various scripts including their optimisation.
163 - 170
Koszt publikacji: 1085,87 zł
Źródło: środki finansowe, o których mowa w art. 365 pkt 2 ustawy
5
70