International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 37 | Number 1 | Year 2016 | Article Id. IJETT-V37P227 | DOI : https://doi.org/10.14445/22315381/IJETT-V37P227

WLAN Penetration Examination of The University of Pembangunan Panca Budi


Akhyar Lubis1 , Andysah Putera Utama Siahaan

Citation :

Akhyar Lubis1 , Andysah Putera Utama Siahaan, "WLAN Penetration Examination of The University of Pembangunan Panca Budi," International Journal of Engineering Trends and Technology (IJETT), vol. 37, no. 1, pp. 165-168, 2016. Crossref, https://doi.org/10.14445/22315381/IJETT-V37P227

Abstract

Hacking and cracking passwords on Wi- Fi in campus location is criminal acts that might approach because it could be considered stealing. Many Wi-Fi SSID are protected. It means that the owner of the Wi-Fi does not allow connections used freely by strangers. The are Many ways to crack it. A penetration test is one of the popular techniques to break the password. This tool directs the user to try to connect to the similar SSID name. However, they do not realize the name they join in is a fake SSID. This moment is used by the attackers to obtain the password. Soon after they try to connect several times, the attacker has been already recorded the SSID password.

Keywords

Security, Penetration Test, Hacking, Wi-Fi.

References

[1] R. W. Beggs, Mastering Kali Linux for Advanced Penetration Testing, Birmingham: Packt Publishing, 2014.
[2] A. Gupta, Kavita dan K. Kaur, “Vulnerability Assessment and Penetration Testing,” International Journal of Engineering Trends and Technology, vol. 4, no. 3, pp. 328-333, 2013.
[3] A. G. Bacudio, 1. Yuan, B.-T. B. Chu dan M. Jones, “An Overview of Penetration Testing,” International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 6, pp. 19-38, 2011.
[4] K. Xynos, I. Sutherland, H. Read, E. Everitt dan A. J. Blyth, “Penetration Testing And Vulnerability Assessments: A Professional Approach,” dalam International Cyber Resilience conference, Perth, 2010.
[5] B.-H. Kang, “About Effective Penetration Testing Methodology,” Journal of Security Engineering, vol. 5, no. 5, pp. 425-432, 2008.
[6] A. P. U. Siahaan, “The Weakness of Wireless Networks,” inSEMILOKA, Medan, 2011.

Time: 0.0013 sec Memory: 32 KB
Current: 1.87 MB
Peak: 4 MB