Research Article | Open Access | Download PDF
Volume 37 | Number 1 | Year 2016 | Article Id. IJETT-V37P227 | DOI : https://doi.org/10.14445/22315381/IJETT-V37P227
WLAN Penetration Examination of The University of Pembangunan Panca Budi
Akhyar Lubis1 , Andysah Putera Utama Siahaan
Citation :
Akhyar Lubis1 , Andysah Putera Utama Siahaan, "WLAN Penetration Examination of The University of Pembangunan Panca Budi," International Journal of Engineering Trends and Technology (IJETT), vol. 37, no. 1, pp. 165-168, 2016. Crossref, https://doi.org/10.14445/22315381/IJETT-V37P227
Abstract
Hacking and cracking passwords on Wi- Fi in campus location is criminal acts that might approach because it could be considered stealing. Many Wi-Fi SSID are protected. It means that the owner of the Wi-Fi does not allow connections used freely by strangers. The are Many ways to crack it. A penetration test is one of the popular techniques to break the password. This tool directs the user to try to connect to the similar SSID name. However, they do not realize the name they join in is a fake SSID. This moment is used by the attackers to obtain the password. Soon after they try to connect several times, the attacker has been already recorded the SSID password.
Keywords
Security, Penetration Test, Hacking, Wi-Fi.
References
[1] R. W. Beggs, Mastering Kali Linux for Advanced Penetration Testing, Birmingham: Packt Publishing, 2014.
[2] A. Gupta, Kavita dan K. Kaur, “Vulnerability Assessment and Penetration Testing,” International Journal of Engineering Trends and Technology, vol. 4, no. 3, pp. 328-333, 2013.
[3] A. G. Bacudio, 1. Yuan, B.-T. B. Chu dan M. Jones, “An Overview of Penetration Testing,” International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 6, pp. 19-38, 2011.
[4] K. Xynos, I. Sutherland, H. Read, E. Everitt dan A. J. Blyth, “Penetration Testing And Vulnerability Assessments: A Professional Approach,” dalam International Cyber Resilience conference, Perth, 2010.
[5] B.-H. Kang, “About Effective Penetration Testing Methodology,” Journal of Security Engineering, vol. 5, no. 5, pp. 425-432, 2008.
[6] A. P. U. Siahaan, “The Weakness of Wireless Networks,” inSEMILOKA, Medan, 2011.