{"title":"A Novel Approach for Wireless Penetration Testing","authors":"Mayank Prajapati, Vipul Narayan, Sashank Awasthi","doi":"10.21058/gjecs.2017.32002","DOIUrl":null,"url":null,"abstract":"In today’s modern era, the internet is essential for everyone. We are using different types of wirelessconnection for connecting to the internet. We are using our home routers, public routers at railway, hotels, restaurant, colleges, etc. But can you guess how your router and how many public routers are secure. The wireless security is not just a word. It requires a lot of knowledge and efforts to secure your network from the evil hackers. This paper not only provide you what are the ways in which you can escape or secure your router from hackers, but also the ways in which a hacker can penetrate your network. Because once you get to know the ways, you can secure your network yourself too. In the paper authors have also discussed comparison of various wireless encryption techniques. KeywordsWEP, WPA, WPA2,Wifite ,Reaver, Aircrack, Fluxion.","PeriodicalId":365710,"journal":{"name":"Gyancity Journal of Electronics and Computer Science","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Gyancity Journal of Electronics and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21058/gjecs.2017.32002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In today’s modern era, the internet is essential for everyone. We are using different types of wirelessconnection for connecting to the internet. We are using our home routers, public routers at railway, hotels, restaurant, colleges, etc. But can you guess how your router and how many public routers are secure. The wireless security is not just a word. It requires a lot of knowledge and efforts to secure your network from the evil hackers. This paper not only provide you what are the ways in which you can escape or secure your router from hackers, but also the ways in which a hacker can penetrate your network. Because once you get to know the ways, you can secure your network yourself too. In the paper authors have also discussed comparison of various wireless encryption techniques. KeywordsWEP, WPA, WPA2,Wifite ,Reaver, Aircrack, Fluxion.