Vulnerability Analysis of GWireless

نویسنده

  • Benjamin Lim
چکیده

Wireless networking has become very popular in recent years due to the increase in adoption of mobile devices. As more and more employees demand for Wi-Fi access for their devices, more companies have been jumping onto the "Bring Your Own Device" (BYOD) bandwagon[1] to appease their employees. One such example of an enterprise wireless infrastructure is the George Washington University’s GWireless. For this project, I will attempt to capture hashes of authentication credentials from users who are connecting to the GWireless network using what is commonly known as the "evil twin" attack. I will document the hardware, software used and steps taken to configure the devices. I will then evaluate the feasibility of such an attack, explore variations of the attack and document measures that can be taken to prevent such an attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Empirical Seismic Vulnerability and Damage of Bottom Frame Seismic Wall Masonry Structure: A Case Study in Dujiangyan (China) Region

In order to understand the seismic performance and mechanism of bottom frame seismic wall masonry structure (BFSWMS) and its vulnerability in empirical seismic damage, based on the statistical and numerical analysis of the field seismic damage observation data of 2178 Dujiangyan structures in the Wenchuan great earthquake urban of China on May 12, 2008, a non-linear function model between the s...

متن کامل

Seismic Vulnerability Assesment of Jacket Type Offshore Platforms

Most of oil and gas offshore platforms are located in the seismic regains. So, Seismic vulnerability evaluation of the offshore platforms is one of the most important and vital issues in the structural systems. In this study, jacket type offshore platforms are studied by incorporating the pushover analyses and nonlinear time history analyses, in such a way that, first some push over analyses ar...

متن کامل

Analysis of spatial vulnerability of threatened strategic urban centers from the point of view of passive defense (case study: Bojnurd city)

Background and objective: Safety and security against threats is one of the most basic principles in order to achieve the desired standards of urban comfort, and attention to the passive defense of cities against external threats has always been considered since the beginning of the formation of cities. Therefore, the purpose of this study is to provide management strategies to reduce the exist...

متن کامل

The Assessment of the Community Capacity on the Urban Vulnerability Based on Community Disaster Risk Management (CBDRM) (Case Study : Yousef-Abad, Tehran City)

Disaster Management and current approaches in this field in one hand only has focused to physicalvulnerabilities and in the other hand has included consequential action to reduce vulnerability and improve physicalpreparation as well as resistance institutional insignificant during the disaster. Therefore, these approaches usually haveignored the capabilities and capacities of residents to reduc...

متن کامل

Ecological Vulnerability Assessment of Mining Areas under Operation (Case Study: Tabas County)

Introduction: Mining is one of the most effective human activities to change the situation in the region, particularly in arid area. The human demand for minerals and energy resources under the ground has made mining and exploration operations inevitable. Mining is one of the common human behaviors with numerous outcomes for the ecosystem along with serious environmental and ecological conseque...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1508.02082  شماره 

صفحات  -

تاریخ انتشار 2015