Networking_Exemplar.pdf (829.9 kB)
Download filePerforming Man in the Middle Attacks Within a Wireless Local Area Network
This paper explores the ease of us of standard Kali Linux tools to analyse network activity, and conduct a series of man-in-the-middle attacks within a wireless local area network. These tests primarily include ARP poisoning, deauthentication attacks and finally cloning a rogue access point to carry out further social engineering attacks and web browser control (with BeEF). Lastly this paper explores the usage of VPNs to protect a user’s privacy as it is difficult to prevent packet sniffing and man-in-the-middle attacks outright
History
Email Address of Submitting Author
rtb1c17@soton.ac.ukSubmitting Author's Institution
University of SouthamptonSubmitting Author's Country
- United Kingdom