Wireless Security Audit Penetration Test Using Raspberry Pi
Title | Wireless Security Audit Penetration Test Using Raspberry Pi |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Shinde, P., Karve, A., Mandaliya, P., Patil, S. |
Conference Name | 2018 International Conference on Smart City and Emerging Technology (ICSCET) |
ISBN Number | 978-1-5386-1185-2 |
Keywords | auditing, authorisation, authorized wireless communications, Communication system security, deliberate jamming, Human Behavior, human factors, jamming, man in the middle, penetration tester, Penetration Testing, pubcrawl, Raspberry Pi 3 module, resilience, Resiliency, Scalability, Security Audits, telecommunication security, Tools, WiFi attacks, WiFi Auditor, WiFi network, WiFi testing tools, Wired Equivalent Privacy, Wireless fidelity, wireless LAN, wireless networks, Wireless Protected Access, wireless security audit, wireless technology |
Abstract | With the advancement in the wireless technology there are more and more devices connected over WiFi network. Security is one of the major concerns about WiFi other than performance, range, usability, etc. WiFi Auditor is a collection of WiFi testing tools and services packed together inside Raspberry Pi 3 module. The WiFi auditor allows the penetration tester to conduct WiFi attacks and reconnaissance on the selected client or on the complete network. WiFi auditor is portable and stealth hence allowing the attacker to simulate the attacks without anyone noticing them. WiFi auditor provides services such as deliberate jamming, blocking or interference with authorized wireless communications which can be done to the whole network or just a particular node. |
URL | https://ieeexplore.ieee.org/document/8537246/authors#authors |
DOI | 10.1109/ICSCET.2018.8537246 |
Citation Key | shinde_wireless_2018 |
- Scalability
- wireless technology
- wireless security audit
- Wireless Protected Access
- wireless networks
- wireless LAN
- Wireless fidelity
- Wired Equivalent Privacy
- WiFi testing tools
- WiFi network
- WiFi Auditor
- WiFi attacks
- tools
- telecommunication security
- Security Audits
- auditing
- Resiliency
- resilience
- Raspberry Pi 3 module
- pubcrawl
- Penetration Testing
- penetration tester
- man in the middle
- Jamming
- Human Factors
- Human behavior
- deliberate jamming
- Communication system security
- authorized wireless communications
- authorisation