Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon
This project aim is to proposed proof of concept of the vulnerability of public Wi-Fi network through spoofing of Access Point (AP). It is already 2020 but due network nature itself, user rarely able distinguish if he/she connect to legit AP while scanning for free public network provided at Café or...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2020
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/107910/1/107910.pdf https://ir.uitm.edu.my/id/eprint/107910/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.107910 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.1079102025-02-03T16:36:52Z https://ir.uitm.edu.my/id/eprint/107910/ Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon Hamidon, Aizlan Nizam Wireless communication systems. Mobile communication systems. Access control Wifi access networks This project aim is to proposed proof of concept of the vulnerability of public Wi-Fi network through spoofing of Access Point (AP). It is already 2020 but due network nature itself, user rarely able distinguish if he/she connect to legit AP while scanning for free public network provided at Café or Fast food restaurant. Worst scenario happen is rogue AP design with same parameters of real AP including ESSID, BSSID and Channel Number make it not too obvious as a medium for the attacker to sniff and capture sensitive data whenever user stroke the user and password credentials. This proof of concept needs to meet objectives of this project. The objectives of this project are to attack, spoofed a legit AP using same SSID information and sniff the deauth packet frame using sniffing tools. A scenario of attack simulation is recreated using Kali Linux and Rogue AP on same network. The attack simulation generate a result where packet frame are sniff and captured using Wireshark, giving credentials information of user and password login data. To help secure the connection of the user while browsing the website through public network, users are recommended to install and browsing using the VPN. 2020 Thesis NonPeerReviewed text en https://ir.uitm.edu.my/id/eprint/107910/1/107910.pdf Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon. (2020) Degree thesis, thesis, Universiti Teknologi MARA (UiTM). <http://terminalib.uitm.edu.my/107910.pdf> |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
topic |
Wireless communication systems. Mobile communication systems. Access control Wifi access networks |
spellingShingle |
Wireless communication systems. Mobile communication systems. Access control Wifi access networks Hamidon, Aizlan Nizam Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon |
description |
This project aim is to proposed proof of concept of the vulnerability of public Wi-Fi network through spoofing of Access Point (AP). It is already 2020 but due network nature itself, user rarely able distinguish if he/she connect to legit AP while scanning for free public network provided at Café or Fast food restaurant. Worst scenario happen is rogue AP design with same parameters of real AP including ESSID, BSSID and Channel Number make it not too obvious as a medium for the attacker to sniff and capture sensitive data whenever user stroke the user and password credentials. This proof of concept needs to meet objectives of this project. The objectives of this project are to attack, spoofed a legit AP using same SSID information and sniff the deauth packet frame using sniffing tools. A scenario of attack simulation is recreated using Kali Linux and Rogue AP on same network. The attack simulation generate a result where packet frame are sniff and captured using Wireshark, giving credentials information of user and password login data. To help secure the connection of the user while browsing the website through public network, users are recommended to install and browsing using the VPN. |
format |
Thesis |
author |
Hamidon, Aizlan Nizam |
author_facet |
Hamidon, Aizlan Nizam |
author_sort |
Hamidon, Aizlan Nizam |
title |
Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon |
title_short |
Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon |
title_full |
Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon |
title_fullStr |
Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon |
title_full_unstemmed |
Proof of concept: attack on wireless environment through Wi-Fi spoofing / Aizlan Nizam Hamidon |
title_sort |
proof of concept: attack on wireless environment through wi-fi spoofing / aizlan nizam hamidon |
publishDate |
2020 |
url |
https://ir.uitm.edu.my/id/eprint/107910/1/107910.pdf https://ir.uitm.edu.my/id/eprint/107910/ |
_version_ |
1823097837361037312 |
score |
13.239859 |