Penetration Testing Solution for Wireless Networks using mobile devices

被引:0
|
作者
Ilovan, Alexandru [1 ]
Iancu, Bogdan [1 ]
机构
[1] Tech Univ Cluj Napoca, Dept Comp Sci, Fac Automat & Comp Sci, Cluj Napoca, Romania
关键词
learning; Wi-Fi; pen testing; security; mobile;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An important problem when teaching cyber security concepts is the difficulty in understanding and testing security and penetration scenarios. Since the beginning of networks and computers, there was a constant battle regarding when, how and who has access to different resources and information. The paper unveils some key insecurities of wireless networks and presents a penetration testing (pen testing) mobile programmable device controlled by a mobile application that can be used for understanding and learning security concepts. The proposed system allows teachers to build low cost hand-on security laboratory solutions and lets students run real security penetration scenarios, to further deepen their cyber security understanding.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] A case study of IP network monitoring using wireless mobile devices
    Shan, XS
    Li, JJ
    TENTH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2001, : 590 - 593
  • [42] Face-to-face media sharing using wireless mobile devices
    Pering, T
    Nguyen, DH
    Light, J
    Want, R
    ISM 2005: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2005, : 269 - 276
  • [43] Rapid prototyping of mobile input devices using wireless sensor nodes
    Carlson, J
    Han, R
    Lao, SD
    Narayan, C
    Sanghani, S
    FIFTH IEEE WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, PROCEEDINGS, 2003, : 21 - 29
  • [44] Energy Scavenging For Mobile and Wireless Devices Using CMOS Rectifier Circuit
    Wong, Y. C.
    Tan, C. W.
    Ranjit, S. S. S.
    Syafeeza, A. R.
    Hamid, N. A.
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 429 - 433
  • [45] Using mobile wireless devices for interactive visualization and analysis of DICOM data
    Andrade, R
    von Wangenheim, A
    Bortoluzzi, MK
    Comunello, E
    CBMS 2003: 16TH IEEE SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS, 2003, : 97 - 101
  • [46] Mobile Devices as an Extension to the Wireless Infrastructure
    Seada, Karim
    2010 7TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE-CCNC 2010, 2010, : 802 - 806
  • [47] Brute force web search for wireless devices using mobile agents
    Zerfiridis, KG
    Karatza, HD
    JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 69 (1-2) : 195 - 206
  • [48] Wireless Network Penetration Testing and Security Auditing
    Wang, Shao-Long
    Wang, Jian
    Feng, Chao
    Pan, Zhi-Peng
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2016), 2016, 7
  • [49] Simulant annealing solution for the routing problem of mobile agents in wireless sensor networks
    Wang, Jun
    Cao, Yong-Tao
    Mi, Zheng-Kun
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (01): : 64 - 68
  • [50] Virtual wireless penetration testing laboratory model
    Skracic, Kristian
    Petrovic, Juraj
    Pale, Predrag
    Tralic, Dijana
    2014 56TH INTERNATIONAL SYMPOSIUM ELMAR (ELMAR), 2014, : 281 - 284