Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon
This project aim is to proposed proof of concept of the vulnerability of public Wi-Fi network through spoofing of Access Point (AP). It is already 2020 but due network nature itself, user rarely able distinguish if he/she connect to legit AP while scanning for free public network provided at Café or...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/107910/1/107910.pdf https://ir.uitm.edu.my/id/eprint/107910/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This project aim is to proposed proof of concept of the vulnerability of public Wi-Fi network through spoofing of Access Point (AP). It is already 2020 but due network nature itself, user rarely able distinguish if he/she connect to legit AP while scanning for free public network provided at Café or Fast food restaurant. Worst scenario happen is rogue AP design with same parameters of real AP including ESSID, BSSID and Channel Number make it not too obvious as a medium for the attacker to sniff and capture sensitive data whenever user stroke the user and password credentials. This proof of concept needs to meet objectives of this project. The objectives of this project are to attack, spoofed a legit AP using same SSID information and sniff the deauth packet frame using sniffing tools. A scenario of attack simulation is recreated using Kali Linux and Rogue AP on same network. The attack simulation generate a result where packet frame are sniff and captured using Wireshark, giving credentials information of user and password login data. To help secure the connection of the user while browsing the website through public network, users are recommended to install and browsing using the VPN. |
---|