TechRxiv
Networking_Exemplar.pdf (829.9 kB)
Download file

Performing Man in the Middle Attacks Within a Wireless Local Area Network

Download (829.9 kB)
preprint
posted on 2022-09-28, 22:12 authored by Reece BuckleReece Buckle

 This paper explores the ease of us of standard Kali Linux tools to analyse network activity, and conduct a series of man-in-the-middle attacks within a wireless local area network. These tests primarily include ARP poisoning, deauthentication attacks and finally cloning a rogue access point to carry out further social engineering attacks and web browser control (with BeEF). Lastly this paper explores the usage of VPNs to protect a user’s privacy as it is difficult to prevent packet sniffing and man-in-the-middle attacks outright 

History

Email Address of Submitting Author

rtb1c17@soton.ac.uk

Submitting Author's Institution

University of Southampton

Submitting Author's Country

  • United Kingdom