scholarly journals Comparison of Wireless Network Penetration Testing Tools on Desktops and Raspberry Pi Platforms

Author(s):  
Aparicio Carranza ◽  
Daniel Mayorga ◽  
Casimer Decusatis
Author(s):  
Palak Aar ◽  
Aman Kumar Sharma

Penetration testing is defined as the procedure of imposing as an attacker to find out the vulnerabilities in a system that can be used to gain access to system for malicious use. This paper provides an overview of penetration testing and list out the criteria used to select the best tools for the given purpose. It also provides a brief description of the selected tools and furthermore we compare those tools. The results of the comparison are shown in terms of graphs and tables.


2021 ◽  
Author(s):  
Kenneth AJ G. Quilantang ◽  
James Andrei C. Rivera ◽  
Mark Vincent M. Pinili ◽  
Alphonsus Joseph Nicollo R. Magpantay ◽  
Eric Busia Blancaflor ◽  
...  

2018 ◽  
Vol 7 (2.15) ◽  
pp. 58
Author(s):  
Mohamad Nur Haziq Mohd Safri ◽  
Wan Nor Shuhadah Wan Nik ◽  
Zarina Mohamad ◽  
Mumtazimah Mohamad

In the past five decades, computer network has kept up growing with the increases of its complexity. In such situation, the management, monitoring and maintenance of such computer network requires special attention to ensure optimal network access capability is achieved. Wireless network traffic analysis is a process of recording, studying and analyzing packets in wireless network for network performance analysis purposes. In some cases, the quality of network access performance can be very low without knowing the actual problem. Therefore, in this paper, the performance of wireless network traffic is proposed to be analyzed by using a Raspberry Pi which further able to send an alert to network admin to lessen the downtime. Raspberry Pi is a low cost, a small and portable size of a computer board that can be used to plug-in to monitor, keyboard, mouse, pen drive, etc. In this project, a MyTraceroute (MTR) program is installed on the Raspberry Pi to capture the IP of the Access Point (AP) and show packets loss percentage in the network. The results will be saved in the form of text file and sent to network admin by using email. The solution proposed in this paper is able to support solution to a problem on efficient monitoring, managing and maintaining wireless network traffics.    


2019 ◽  
Vol 14 (2) ◽  
pp. 50
Author(s):  
Whisnumurti Adhiwibowo ◽  
Baik Catur Ardiansyah

Raspberry Pi is a credit card-sized SBC (Single Board Computer) developed by the Raspberry Pi Foundation in the UK with the aim of teaching basic computer science at school. Raspberry Pi can be used for various things including wireless. In this study will be carried out the implementation of wireless routers by using Raspberry Pi as the main media. This is done to implement the use of Raspberry Pi devices as an alternative to Wireless Routers or in the world of networking. The Wireless Router implementation method used is the PPDIOO network cycle method owned by CISCO which has the stages of Prepare, Plan, Design, Implement, Operate, and Optimize. Wireless Router implementation uses several devices between Edimax - Wireless 802.11b / g / n usb wireless adapter as a device or Broadcast Wireless Raspberry Pi media as the main function of the device and system owned by the Wireless Router. Wireless Routers using Raspberry Pi become one of the best solutions for the needs of adding new wireless network segments if you see in terms of limited funds and existing devices. An administrator will easily build a new network using Raspberry Pi.


2022 ◽  
Vol 7 (1) ◽  
pp. 43-51
Author(s):  
Stefanus Eko Prasetyo ◽  
Try Windranata

aringan Nirkabel merupakan sekumpulan perangkat elektronik yang menghubungkan satu dengan yang lain memanfaatkan perangkat udara alias frekuensi jadi alur lintas data. Masa sekarang ini, ada banyak pengguna yang memanfaatkan WPA2-PSK ataupun WPA2-EAP menjadi security system jaringan nirkabel yang bertujuan untuk menghindari orang yang mengakses tanpa izin.  Riset ini memakai teknik wireless penetration testing yang memakai fluxion tools dengan membandingkan dan menganalisis security system otentikasi WPA2 dengan EAP-PSK pada jaringan nirkabel yang bertujuan untuk mengetahui kerentanan sebuah sistem keamanan jaringan tersebut. Untuk melaksanakan penetration testing penulis mengacu terhadap “Wireless Network Penetration Testing Methodology.” Yang terdiri dari intelligence gathering, vulnerability analysis, threat modelling, password cracking, dan reporting. Dari penelitian ini akan menyimpulkan WPA2-PSK kurang aman untuk digunakan dikarenakan terlihat pada penetration testing tesrsebut WPA2-PSK berhasil dibobol dalam keadaan SSID unhide­, sedangkan WPA2-EAP berhasil dalam pembuatan Web Interface namun tidak berhasil dalam mendapatkan informasi seperti username dan passwor. Jika WPA2-PSK SSID dalam keadaan hide akan mengagalkan peretasan sehingga dari sistem keamanan kedua tersebut memiliki kelebihan dan kekurangan masing-masing tergantung kebutuhan pengguna.


Complexity ◽  
2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
He-Jun Lu ◽  
Yang Yu

Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network.


2021 ◽  
Vol 10 (1) ◽  
pp. 7
Author(s):  
Renas R. Asaad

This paper implements a wireless attack technique by cracking the password on kali Linux OS using Hashcat technique. This study identifies the security weakness, using brute-force attack for online attacking and straight attack for offline attacking. The brute-force attack is also recognized as a detailed search, where it attempts guessing the target password one password at a time until reaching the correct password, which is called a dictionary attack. then using hash algorithms to deal with MD5 hash algorithm and SHA-512 (Linux). In this article, we will learn about the various wireless attacks. These days, wireless networks are everywhere. With users being on the go like never before, having to remain stationary because of having to plug into an Ethernet cable to gain Internet access is not feasible. For this convenience, wireless connections are not as secure as Ethernet connections. In this article, we will explore various methods for manipulating wireless attacks and their techniques including several methods on Linux.


Sign in / Sign up

Export Citation Format

Share Document