scholarly journals Research on WiFi Penetration Testing with Kali Linux

Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
He-Jun Lu ◽  
Yang Yu

Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network.

Author(s):  
P.L. RAMTEKE ◽  
D.N. CHOUDHARY

The computer network connection without wire or any cable is referring as wireless network. These wireless local area networks are popular for its worldwide applications. It has covered wide scale wireless local area network. The large scale systems to all applicable areas make large numbers of wireless termination and covering very much area. To reduce the complexity associated with server management, Information Technology organizations begins the process of centralizing servers. It used with architecture principles of centralized management requirement for network to scale, network architecture needs to be able to support enhanced services in addition to just raw connectivity, distributed processing is required both for scalability ability and services, network support continuously increase the level of throughputs etc. Wireless LAN product architectures have evolved from single autonomous access points to systems, consisting of a centralized Access Controller and Wireless Termination Points. The basic goal of centralized control architectures is to move access control, including user authentication and authorization, mobility & radio management, from one access point to centralized controller. The Wireless network Control Protocol allows for access and control of large-scale wireless local area networks. It can allows management of these networks, Control and Provisioning of Wireless Access Points In computer networking, a wireless access point is a device that allows wireless devices to connect to wired network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router via a wired network, and can relay data between the wireless devices such as computers or printers and wired devices on the network.


2012 ◽  
Vol 571 ◽  
pp. 510-513
Author(s):  
Zheng Wan ◽  
Jian Hua Shen ◽  
Liang Bao Jiao

Air interface signaling gathering and data analysis is the key technology in wireless network optimizations. Improved system architecture based on Smart Gathering Terminal (SGT), which performs the air interface signaling data collection and analysis is introduced in this paper. A signaling collection and processing strategy which based on cycle-queue and multithread data procession is proposed to increase the system efficiency and fulfill completeness requirement. Theoretical and experimental results show that the improved strategy can significantly increase data collection’s efficiency and ensure the signaling completeness.


Author(s):  
Manjula B. ◽  
◽  
Devendra Kumar ◽  
Rani Medhashree ◽  
◽  
...  

Today, Wireless communication is so vital in the field of science and technology. Research regarding these capabilities suggests that Wireless LANs. Virtualization of the wireless network interface, which means using a single wireless network interface to connect to more than one network simultaneously. This paper provides an introductory study for the Creation of a virtual WLAN controller that will implement many of the configuration functions currently running on several Wireless Access point to a centralized box. This will allow seamless management of large numbers of such access points running different hardware to be seamlessly managed. The firmware running on the access point will an OpenWRT open source solution that will use CAPWAP protocol to communicate with the virtual LAN controller.


2015 ◽  
Vol 2015 ◽  
pp. 1-14 ◽  
Author(s):  
Ali Doğanaksoy ◽  
Fatih Sulak ◽  
Muhiddin Uğuz ◽  
Okan Şeker ◽  
Ziya Akcengiz

Random sequences and random numbers constitute a necessary part of cryptography. Many cryptographic protocols depend on random values. Randomness is measured by statistical tests and hence security evaluation of a cryptographic algorithm deeply depends on statistical randomness tests. In this work we focus on statistical distributions of runs of lengths one, two, and three. Using these distributions we state three new statistical randomness tests. New tests useχ2distribution and, therefore, exact values of probabilities are needed. Probabilities associated runs of lengths one, two, and three are stated. Corresponding probabilities are divided into five subintervals of equal probabilities. Accordingly, three new statistical tests are defined and pseudocodes for these new statistical tests are given. New statistical tests are designed to detect the deviations in the number of runs of various lengths from a random sequence. Together with some other statistical tests, we analyse our tests’ results on outputs of well-known encryption algorithms and on binary expansions ofe,π, and2. Experimental results show the performance and sensitivity of our tests.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Ting Qian ◽  
Ling Wei

As an important tool for data analysis and knowledge processing, formal concept analysis (FCA) has been applied to many fields. In this paper, we introduce a new method to find all formal concepts based on formal contexts. The amount of intents calculation is reduced by the method. And the corresponding algorithm of our approach is proposed. The main theorems and the corresponding algorithm are examined by examples, respectively. At last, several real-life databases are analyzed to demonstrate the application of the proposed approach. Experimental results show that the proposed approach is simple and effective.


Author(s):  
Alexander Olave ◽  
Luis Felipe Valencia ◽  
Juan Carlos Cuéllar

Resumen Voz sobre IP, VoIP, es uno de los servicios con mayor desarrollo bajo plataformas inalámbricas; actualmente se ha iniciado su implementación como alternativa frente a la PSTN (red pública conmutada). El interés por VoIP radica en su relación costo-beneficio, ya que las organizaciones pueden utilizar la misma plataforma de su red de datos para transmitir voz. Por lo anterior, es importante que la organización tenga claro que, para garantizar el buen funcionamiento del servicio de VoIP, es decir para ofrecer QoS, se debe realizar la medición de parámetros que afectan la calidad del servicio como lo son: el retardo, la variación del retardo, el ancho de banda y la pérdida de paquetes. Este artículo analiza y valida los parámetros de QoS necesarios para garantizar el buen funcionamiento del servicio de VoIP sobre la red inalámbrica del campus de la Universidad Icesi. Se realizan pruebas en diferentes escenarios para mostrar que no solo factores como el retardo, y su variación, influyen en la calidad de servicio, sino que también la intensidad de la señal que recibe el cliente desde los puntos de acceso.Palabras Clave: Voz sobre IP, Calidad de servicio, Pérdida de paquetes, Retardo, Variación del Retardo, Intensidad de Señal. Abstract VoIP is one of the services that has been developing over under this type of wireless platforms and today has begun to implement as an alternative to the PSTN (Public Switched Telephone Network). The interest in VoIP is its cost-benefit ratio, and that organizations can use the same platform for their data network to transmit voice. Therefore it is important that the organization is clear that to ensure the smooth operation of the VoIP service, ie provide QoS, you must perform the measurement of parameters that affect the quality of service such as: delay, jitter, bandwidth, packet loss. In this paper we analyze and validate the QoS parameters needed to ensure the smooth operation of VoIP over wireless network on the Icesi University campus. We performed a series of tests in different scenarios to show that not only factors such as delay and jitter influencing the quality of service, but also the client signal strength received from of the AP (Access Point).Keywords: Voice over IP, Quality of service, Packet Loss, Delay, Delay variation, signal intensity.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Zhijun Wang

Since the artistry of the work cannot be accurately described, the identification of reproducible plagiarism is more difficult. The identification of reproducible plagiarism of digital image works requires in-depth research on the artistry of artistic works. In this paper, a remote judgment method for plagiarism of painting image style based on wireless network multitask learning is proposed. According to this new method, the uncertainty of painting image samples is removed based on multitask learning algorithm edge sampling. The deep-level details of the painting image are extracted through the multitask classification kernel function, and most of the pixels in the image are eliminated. When the clustering density is greater than the judgment threshold, it can be considered that the two images have spatial consistency. It can also be judged based on this that the two images are similar, that is, there is plagiarism in the painting. The experimental results show that the discrimination rate is always close to 100%, the misjudgment rate of plagiarism of painting images has been reduced, and the various indicators in the discrimination process are the lowest, which fully shows that a very satisfactory discrimination result can be obtained.


2020 ◽  
Vol 3 (2) ◽  
pp. 137-151
Author(s):  
Ai Tia Setiawati ◽  
Yayat Hidayat

Parent's attention to children is still lacking, caused by several things including busyness, low educational background, lack of parent's direction of everything that has been achieved by the child, causing the child to become indifferent to learning. The problems that arise are how the influence of parenting parents on student learning discipline at MTs Al Hidayah Ciomas Panjalu.This study aims to determine the extent of the influence of parenting on student learning discipline in MTs Al Hidayah Ciomas Panjalu.The method used in this research is descriptive method with quantitative approach. The study population at MTs Al Hidayah was 162 students with a sample of 35 people. Sampling was done by purposive sampling technique. The data collection tool taken was observation and questionnaire as many as 35 respondents, after the data was collected with complete stages. The next step was data analysis using spermant rank coefficient (rs). Parental parenting values in Al Hidayah MTs were obtained at 39.4 at intervals of 38.2 - 40.3 with a fairly good classification. While the learning discipline value of students in Al Hidayah MTs was obtained at 37.97 at intervals of 35.22 - 38.44 with poor classification. Based on the testing of hypotheses that have been done, the results have a pretty good effect between parenting parents with student learning discipline in MTs Al Hidayah. This is obtained from rs = 0.59 with the Guilford scale at an interval of 0.41 - 0.60 with a fairly good classification. The pattern of Oreangtua Parenting affects the Discipline of Student Learning is 35% so 65% is influenced by other factors. The influence of these two variables, namely Parenting Parents Against Student Learning Discipline is a significant correlation. This is evidenced by t_count = 4.20> t_table = 1.69236 so that Ha is accepted and Ho is rejected. Thus Parenting Parents have a pretty good effect on Student Learning Discipline.


Sign in / Sign up

Export Citation Format

Share Document