Automation of MitM Attack on Wi-Fi Networks
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F17%3APU126543" target="_blank" >RIV/00216305:26230/17:PU126543 - isvavai.cz</a>
Result on the web
<a href="https://link.springer.com/book/10.1007/978-3-319-73697-6" target="_blank" >https://link.springer.com/book/10.1007/978-3-319-73697-6</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-3-319-73697-6_16" target="_blank" >10.1007/978-3-319-73697-6_16</a>
Alternative languages
Result language
angličtina
Original language name
Automation of MitM Attack on Wi-Fi Networks
Original language description
Widely used network technologies and principles of wireless security suffer weaknesses that can be exploited to perform the Man-in-the-Middle attack, allowing to eavesdrop or to spoof the network communication. The work focuses on possibilities of automation of the attack with a utilization of available specialized tools. The outcome of the research is the wifimitm package and the wifimitmcli CLI tool, both implemented in Python. The package provides functionality for automated MitM attack and can be used by other software. The wifimitmcli tool is capable of performing a successful fully automated attack without any intervention from an investigator. This research is intended to be used for automated penetration testing and to ease forensic investigation. Finally, a popularization of the fact that such severe attacks can be successfully automated should be used to raise the public awareness about the information security.
Czech name
—
Czech description
—
Classification
Type
J<sub>SC</sub> - Article in a specialist periodical, which is included in the SCOPUS database
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/VI20172020062" target="_blank" >VI20172020062: Integrated platform for analysis of digital data from security incidents</a><br>
Continuities
S - Specificky vyzkum na vysokych skolach
Others
Publication year
2017
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
ISSN
1867-8211
e-ISSN
—
Volume of the periodical
2018
Issue of the periodical within the volume
216
Country of publishing house
NL - THE KINGDOM OF THE NETHERLANDS
Number of pages
14
Pages from-to
207-220
UT code for WoS article
—
EID of the result in the Scopus database
2-s2.0-85041109732