SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 165
WLAN Penetration Examination of The
University of Pembangunan Panca Budi
Akhyar Lubis1
, Andysah Putera Utama Siahaan2
Faculty of Computer Science, Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
Abstract–Hacking and cracking passwords on Wi-
Fi in campus location is criminal acts that might
approach because it could be considered stealing.
Many Wi-Fi SSID are protected. It means that the
owner of the Wi-Fi does not allow connections used
freely by strangers. The are Many ways to crack it. A
penetration test is one of the popular techniques to
break the password. This tool directs the user to try
to connect to the similar SSID name. However, they do
not realize the name they join in is a fake SSID. This
moment is used by the attackers to obtain the
password. Soon after they try to connect several times,
the attacker has been already recorded the SSID
password.
Keywords –Security, Penetration Test, Hacking, Wi-Fi
I. INTRODUCTION
Internet connectivity continues to grow up as
millions of new devices are connected to the global
network [4].Many users do not know the danger of
wireless connections [6]. Security is the big problem
of information system [3]. The University of
Pembangunan Panca Budi has implemented the IS / IT
as a supporting system. It triggers business in the
world of education. A critical issue for educational
institutions is the threat of a rise in attacks against
information systems. This problem is due to a
combination of increasingly sophisticated attack tools
and automated, the growing number of discovered
attacks and improved user connectivity. As the system
is open to students, staff, faculty and accessible in
public, so the network becomes more complex and
more vulnerable to security breaches. That is why the
problem of information security is one of the most
challenging problems faced by companies and
educational institutions.The IT administrator keeps
trying to improve the the security to protect the data
from being stolen.
The first thing before making the attack, we have to
do a Reconnaissance. It makes our target is familiar to
us [1].Penetration testing is performed on a wireless
network in the Faculty of Computer Science to
identify the weaknesses and the uncover risk of the
system on a wireless network [2][5]. Testing allows
use several methods to get into the target tissue, often
to penetrate network security system begins at a
relatively low priorities parts and then used it to attack
sensitive areas. One of them is the attacker will try to
get into the network infrastructure. It can easily
monitor the activities of the user or users via a
wireless network. The attacker must be able to enter
into the internal network via wireless LAN.
II. THEORIES
Several models authentication such as MAC
address filtering, WEP, WPA, WPA2, SSID filtering
and Filtering Protocol can secure LAN and WLAN.
The University of Pembangunan Panca Budi uses a
cable-based LAN connection and wireless. Almost all
users, faculty staff, students and employees take
advantage of this technology. They cover several
points installing the hotspot in some areas. It makes
the signal covers the entire area of the campus location.
There are several points of the access point used by
employees to access the local network of information
systems related to the employee, the financial system
and the academy system. The administrator gives the
password using WPA2 security system to users who
want to access the network.
Fig. 1 The network diagram
Figure 1 is the example the network diagram on
campus. As we can see, there are various computers
connect to the Wi-Fi available. We do not know who,
where and when the attackers attack the security.
Some of them can use direct cable connection or even
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 166
hack the wireless signal. Wireless connection is less
secure than cable. We have to strengthen the security
to avoid the intruder to breach the firewall.
III. PROPOSED WORK
This research uses both software and hardware.
Figure 2 is Leguang LG-N960. It is one of the external
wireless that has a penetration module. We use the
external wireless USB adapter that supports injection
and sniffing. This device has a 23dBi panel antenna. It
has 10 meters internal cable. It allows the placement
using a pole antenna. This hardware works at 2.4GHz
of standard protocol 802.11bgn by using Ralink
RT3070 chipset include 30 dBm transmit power. It
claims that this hardware can manipulate the Wi-Fi
signal stronger than another.
Fig. 2Leguang LG-N960
The software needed is Linset. It is a hacking tool
that runs on the Linux Operating System. It allows the
attacker retrieve the Wi-Fi password which secured by
WPA or WPA2 security type without having to use
the brute force wordlist. Linset techniques used on
"Evil Twin Attack" which is a technique used attacker
to create a wireless network name is the same as the
original name of the wireless network. Attackers will
interfere and produce a stronger signal than the signal
is valid or disable user access point exist. It guides the
user by directing a denial of service or creating
disturbances surrounding radio frequency. The users
do not realize that they are being redirected to the fake
SSID. The can always monitor traffic to search for
confidential information.
The scope of the assessment of related penetration
testing against wireless LAN network by utilizing
Linset that runs on the Linux operating system time.
Tests conducted on wireless networks on the Faculty
of Computer Science to conduct testing on wireless
networks including attempting to exploit
vulnerabilities using tools Linset application level. In
this test, we put the hardware not too far from the
targeted Wi-Fi access point. It is to ensure that the
penetration test works successfully. In this part, we try
to beat the original signal produced. We hope the
penetration signal level will replace the position.
Moreover, if it happens, the users who want to connect
to the network, they will be deceived and attached to
the fake SSID provided by the penetration hardware.
IV. TESTING AND IMPLEMENTATION
First, penetration testing is performed by finding
the target against the SSID contained in the computer
science faculty. The operating system used is the time
the Linux 2.0. After it has successfully booted, the
next step is to go into terminal mode. We have to
install Linset previously. It will be used as the attacker
intended SSID.Then run the program to identify the
Access Points exist. Network scanning needs time to
accomplish.
Fig.3List of APs Objective
Figure 3 illustrates the SSID list obtained from the
scanning. On the results of the above SSID of
pancabudi_FILKOM, it is located at number 17. The
next steps are more specifically detailing the access
point selection to be attacked. The duplication of SSID
is created soon after we choose the selected target.
Figure 4 shows the step of duplication.
Fig. 4 Duplication of SSID
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 167
When we finish this part, there will be two identical
SSID where people do not realize the difference
between them. It makes the users try to connect to the
other SSID when they have failed get attached to the
original one.
Fig 5 Modes of Attack
Figure 5 shows the modes of attack. There are three
modes how to attack the access points. In this section,
we use number two, that is the mdk3.
Fig. 6 Interface Web
The above figure explains what the user see on
screen. We can change the SSID display by rewrite
the text message again. However, in this case, we
choose number one to avoid the modification of the
SSID name.
Fig. 7 Save Configuration
Right after we finish and save the configuration as
showed in Figure 7, we will be asked whether the
configuration is safe. We just press enter to continue
to the last step.
Fig. 8 Language selection
Figure 8 shows the languages available. We can
select the appropriate to us. If we want to put it in
International, just choose number one as the English
language. This section ends the configuration of the
penetration test. The test is already on board. We just
wait the users try to connect to the fake SSID.
Someone who fail to log into the original network, he
must be working on the similar name with the exact
password. But once he type the wrong password, he
will be disconneted and redirected to the fake SSID.
Fig. 9 Obtained SSID password
International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016
ISSN: 2231-5381 http://www.ijettjournal.org Page 168
Figure 9 illustrates the password has been found by
the Linset tool. Once we note it on paper, we can
disconnect the hardware and try to connect to the
original SSID. Finally, we are connected. From now
and then we can use the password forever as long as
the owner do not change the password. If we just use
for the common purpose, maybe it does not matter.
However, if we force the Wi-Fi to download much
content, they might realize what we have done to their
networks.
V. CONCLUSION
In the global network, the security level is very
crucial. Maybe we loose our valuable information
because of our negligence. Using the penetration test
is the best way to measure our safety level. Not all the
SSID can be breached by this method. Maybe if the
network owners do not have the security knowledge, it
will be vulnerable. The debate is still in penetreation
test and vulnerability. This tool is not intent to steal
confidential information. It helps people to increase
the security from gap found using the penetration test.
REFERENCES
[1] R. W. Beggs, Mastering Kali Linux for Advanced Penetration
Testing, Birmingham: Packt Publishing, 2014.
[2] A. Gupta, Kavita dan K. Kaur, “Vulnerability Assessment and
Penetration Testing,” International Journal of Engineering
Trends and Technology, vol. 4, no. 3, pp. 328-333, 2013.
[3] A. G. Bacudio, 1. Yuan, B.-T. B. Chu dan M. Jones, “An
Overview of Penetration Testing,” International Journal of
Network Security & Its Applications (IJNSA), vol. 3, no. 6, pp.
19-38, 2011.
[4] K. Xynos, I. Sutherland, H. Read, E. Everitt dan A. J. Blyth,
“Penetration Testing And Vulnerability Assessments: A
Professional Approach,” dalam International Cyber Resilience
conference, Perth, 2010.
[5] B.-H. Kang, “About Effective Penetration Testing
Methodology,” Journal of Security Engineering, vol. 5, no. 5,
pp. 425-432, 2008.
[6] A. P. U. Siahaan, “The Weakness of Wireless Networks,”
inSEMILOKA, Medan, 2011.
AUTHORS PROFILE
Akhyar Lubis was born in
Medan, Indonesia, in 1983. He
received the S.Kom. degree in
computer science from
Universitas Pembangunan
Panca Budi, Medan, Indonesia,
in 2006. He is now studying at
AMIKOM Yogyakarta for his
master degree in computer science. In 2008, he started
to join the Faculty of Engineering, Universitas
Pembangunan Panca Budi, as a Lecturer, and in 2016
became a Cisco Trainer. He has taught many
networking students. He has always had many
contributions in journal events.
Andysah Putera Utama
Siahaan was born in 1980,
Medan, Indonesia. He received
the S.Kom. degree in computer
science from Universitas
Pembangunan Panca Budi,
Medan, Indonesia, in 2010,
and in 2012, he obtained
M.Kom. from the University
of Sumatera Utara, Medan,
Indonesia. In 2010, he joined as a lecturer at the
Department of Engineering, Universitas Pembangunan
Panca Budi. He has been a researcher since 2012. He
has studied his Ph. D. degree from 2016. He is now
active in writing international journals and
conferences.

Mais conteúdo relacionado

Mais procurados

4 wifi security
4 wifi security4 wifi security
4 wifi securityal-sari7
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Networkijtsrd
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTBarcoding, Inc.
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis MPhil/MRes/BSc
 
A Steganography-based Covert Keylogger
A Steganography-based Covert KeyloggerA Steganography-based Covert Keylogger
A Steganography-based Covert KeyloggerCSCJournals
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
A Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesA Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesIJERA Editor
 
Secure communication
Secure communicationSecure communication
Secure communicationTushar Swami
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system IJECEIAES
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networkinganita maharjan
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSIAEME Publication
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)CSCJournals
 
Insider (Network Tool)
Insider (Network Tool)Insider (Network Tool)
Insider (Network Tool)akki_hearts
 

Mais procurados (18)

4 wifi security
4 wifi security4 wifi security
4 wifi security
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
Security Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoTSecurity Architecture for Small Branch and IoT
Security Architecture for Small Branch and IoT
 
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and VulnerabilitiesMeletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
Meletis Belsis - Wireless Security: Common Protocols and Vulnerabilities
 
A Steganography-based Covert Keylogger
A Steganography-based Covert KeyloggerA Steganography-based Covert Keylogger
A Steganography-based Covert Keylogger
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
A Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesA Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart Phones
 
Secure communication
Secure communicationSecure communication
Secure communication
 
Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system Developed security and privacy algorithms for cyber physical system
Developed security and privacy algorithms for cyber physical system
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Cyber security
Cyber securityCyber security
Cyber security
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Wireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field StudyWireless Networks Security in Jordan: A Field Study
Wireless Networks Security in Jordan: A Field Study
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)International Journal of Computer Science and Security Volume (1) Issue (3)
International Journal of Computer Science and Security Volume (1) Issue (3)
 
Insider (Network Tool)
Insider (Network Tool)Insider (Network Tool)
Insider (Network Tool)
 

Destaque

Steve Jobs Presentations
Steve Jobs PresentationsSteve Jobs Presentations
Steve Jobs Presentationscarolineshawley
 
Securing Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemSecuring Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemUniversitas Pembangunan Panca Budi
 
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
 group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da... group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...dhenzelhopkins
 
Accoglimento del cliente
Accoglimento del clienteAccoglimento del cliente
Accoglimento del clienteptesone
 
Fuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific KnowledgeFuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific KnowledgeUniversitas Pembangunan Panca Budi
 
Trouble shooting apachecloudstack
Trouble shooting apachecloudstackTrouble shooting apachecloudstack
Trouble shooting apachecloudstackSailaja Sunil
 

Destaque (9)

Steve Jobs Presentations
Steve Jobs PresentationsSteve Jobs Presentations
Steve Jobs Presentations
 
Securing Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating SystemSecuring Short Message Service Using Vernam Cipher in Android Operating System
Securing Short Message Service Using Vernam Cipher in Android Operating System
 
The ice age
The ice ageThe ice age
The ice age
 
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
 group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da... group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
group of south korea springhill: The Stalking of Korean Hip Hop Superstar Da...
 
Media kit EasyFinance
Media kit EasyFinanceMedia kit EasyFinance
Media kit EasyFinance
 
Accoglimento del cliente
Accoglimento del clienteAccoglimento del cliente
Accoglimento del cliente
 
Fuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific KnowledgeFuzzification of College Adviser Proficiency Based on Specific Knowledge
Fuzzification of College Adviser Proficiency Based on Specific Knowledge
 
Trouble shooting apachecloudstack
Trouble shooting apachecloudstackTrouble shooting apachecloudstack
Trouble shooting apachecloudstack
 
Kalinin
KalininKalinin
Kalinin
 

Semelhante a WLAN Penetration Examination of The University of Pembangunan Panca Budi

International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineeringanchalsinghdm
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesIRJET Journal
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi SecurityIRJET Journal
 
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network IJECEIAES
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityDustin Pytko
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
An overview of network penetration testing
An overview of network penetration testingAn overview of network penetration testing
An overview of network penetration testingeSAT Publishing House
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersLeMeniz Infotech
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............AkilSayyad2
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...IRJET Journal
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...IRJET Journal
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET Journal
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET Journal
 

Semelhante a WLAN Penetration Examination of The University of Pembangunan Panca Budi (20)

International Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics EngineeringInternational Conference On Electrical and Electronics Engineering
International Conference On Electrical and Electronics Engineering
 
Survey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) DevicesSurvey on Security Issues of Internet of Things (IoT) Devices
Survey on Security Issues of Internet of Things (IoT) Devices
 
IRJET - IDS for Wifi Security
IRJET -  	  IDS for Wifi SecurityIRJET -  	  IDS for Wifi Security
IRJET - IDS for Wifi Security
 
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network  Detection of Rogue Access Point in WLAN using Hopfield Neural Network
Detection of Rogue Access Point in WLAN using Hopfield Neural Network
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
A Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network SecurityA Review Of IP And MAC Address Filtering In Wireless Network Security
A Review Of IP And MAC Address Filtering In Wireless Network Security
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
An overview of network penetration testing
An overview of network penetration testingAn overview of network penetration testing
An overview of network penetration testing
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPCo-operative Wireless Intrusion Detection System Using MIBs From SNMP
Co-operative Wireless Intrusion Detection System Using MIBs From SNMP
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...Detecting Password brute force attack and Protecting the cloud data with AES ...
Detecting Password brute force attack and Protecting the cloud data with AES ...
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 

Mais de Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
 

Mais de Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 
Examination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp AlgorithmExamination of Document Similarity Using Rabin-Karp Algorithm
Examination of Document Similarity Using Rabin-Karp Algorithm
 

Último

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxAmita Gupta
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxdhanalakshmis0310
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Último (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Magic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptxMagic bus Group work1and 2 (Team 3).pptx
Magic bus Group work1and 2 (Team 3).pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

WLAN Penetration Examination of The University of Pembangunan Panca Budi

  • 1. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 165 WLAN Penetration Examination of The University of Pembangunan Panca Budi Akhyar Lubis1 , Andysah Putera Utama Siahaan2 Faculty of Computer Science, Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract–Hacking and cracking passwords on Wi- Fi in campus location is criminal acts that might approach because it could be considered stealing. Many Wi-Fi SSID are protected. It means that the owner of the Wi-Fi does not allow connections used freely by strangers. The are Many ways to crack it. A penetration test is one of the popular techniques to break the password. This tool directs the user to try to connect to the similar SSID name. However, they do not realize the name they join in is a fake SSID. This moment is used by the attackers to obtain the password. Soon after they try to connect several times, the attacker has been already recorded the SSID password. Keywords –Security, Penetration Test, Hacking, Wi-Fi I. INTRODUCTION Internet connectivity continues to grow up as millions of new devices are connected to the global network [4].Many users do not know the danger of wireless connections [6]. Security is the big problem of information system [3]. The University of Pembangunan Panca Budi has implemented the IS / IT as a supporting system. It triggers business in the world of education. A critical issue for educational institutions is the threat of a rise in attacks against information systems. This problem is due to a combination of increasingly sophisticated attack tools and automated, the growing number of discovered attacks and improved user connectivity. As the system is open to students, staff, faculty and accessible in public, so the network becomes more complex and more vulnerable to security breaches. That is why the problem of information security is one of the most challenging problems faced by companies and educational institutions.The IT administrator keeps trying to improve the the security to protect the data from being stolen. The first thing before making the attack, we have to do a Reconnaissance. It makes our target is familiar to us [1].Penetration testing is performed on a wireless network in the Faculty of Computer Science to identify the weaknesses and the uncover risk of the system on a wireless network [2][5]. Testing allows use several methods to get into the target tissue, often to penetrate network security system begins at a relatively low priorities parts and then used it to attack sensitive areas. One of them is the attacker will try to get into the network infrastructure. It can easily monitor the activities of the user or users via a wireless network. The attacker must be able to enter into the internal network via wireless LAN. II. THEORIES Several models authentication such as MAC address filtering, WEP, WPA, WPA2, SSID filtering and Filtering Protocol can secure LAN and WLAN. The University of Pembangunan Panca Budi uses a cable-based LAN connection and wireless. Almost all users, faculty staff, students and employees take advantage of this technology. They cover several points installing the hotspot in some areas. It makes the signal covers the entire area of the campus location. There are several points of the access point used by employees to access the local network of information systems related to the employee, the financial system and the academy system. The administrator gives the password using WPA2 security system to users who want to access the network. Fig. 1 The network diagram Figure 1 is the example the network diagram on campus. As we can see, there are various computers connect to the Wi-Fi available. We do not know who, where and when the attackers attack the security. Some of them can use direct cable connection or even
  • 2. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 166 hack the wireless signal. Wireless connection is less secure than cable. We have to strengthen the security to avoid the intruder to breach the firewall. III. PROPOSED WORK This research uses both software and hardware. Figure 2 is Leguang LG-N960. It is one of the external wireless that has a penetration module. We use the external wireless USB adapter that supports injection and sniffing. This device has a 23dBi panel antenna. It has 10 meters internal cable. It allows the placement using a pole antenna. This hardware works at 2.4GHz of standard protocol 802.11bgn by using Ralink RT3070 chipset include 30 dBm transmit power. It claims that this hardware can manipulate the Wi-Fi signal stronger than another. Fig. 2Leguang LG-N960 The software needed is Linset. It is a hacking tool that runs on the Linux Operating System. It allows the attacker retrieve the Wi-Fi password which secured by WPA or WPA2 security type without having to use the brute force wordlist. Linset techniques used on "Evil Twin Attack" which is a technique used attacker to create a wireless network name is the same as the original name of the wireless network. Attackers will interfere and produce a stronger signal than the signal is valid or disable user access point exist. It guides the user by directing a denial of service or creating disturbances surrounding radio frequency. The users do not realize that they are being redirected to the fake SSID. The can always monitor traffic to search for confidential information. The scope of the assessment of related penetration testing against wireless LAN network by utilizing Linset that runs on the Linux operating system time. Tests conducted on wireless networks on the Faculty of Computer Science to conduct testing on wireless networks including attempting to exploit vulnerabilities using tools Linset application level. In this test, we put the hardware not too far from the targeted Wi-Fi access point. It is to ensure that the penetration test works successfully. In this part, we try to beat the original signal produced. We hope the penetration signal level will replace the position. Moreover, if it happens, the users who want to connect to the network, they will be deceived and attached to the fake SSID provided by the penetration hardware. IV. TESTING AND IMPLEMENTATION First, penetration testing is performed by finding the target against the SSID contained in the computer science faculty. The operating system used is the time the Linux 2.0. After it has successfully booted, the next step is to go into terminal mode. We have to install Linset previously. It will be used as the attacker intended SSID.Then run the program to identify the Access Points exist. Network scanning needs time to accomplish. Fig.3List of APs Objective Figure 3 illustrates the SSID list obtained from the scanning. On the results of the above SSID of pancabudi_FILKOM, it is located at number 17. The next steps are more specifically detailing the access point selection to be attacked. The duplication of SSID is created soon after we choose the selected target. Figure 4 shows the step of duplication. Fig. 4 Duplication of SSID
  • 3. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 167 When we finish this part, there will be two identical SSID where people do not realize the difference between them. It makes the users try to connect to the other SSID when they have failed get attached to the original one. Fig 5 Modes of Attack Figure 5 shows the modes of attack. There are three modes how to attack the access points. In this section, we use number two, that is the mdk3. Fig. 6 Interface Web The above figure explains what the user see on screen. We can change the SSID display by rewrite the text message again. However, in this case, we choose number one to avoid the modification of the SSID name. Fig. 7 Save Configuration Right after we finish and save the configuration as showed in Figure 7, we will be asked whether the configuration is safe. We just press enter to continue to the last step. Fig. 8 Language selection Figure 8 shows the languages available. We can select the appropriate to us. If we want to put it in International, just choose number one as the English language. This section ends the configuration of the penetration test. The test is already on board. We just wait the users try to connect to the fake SSID. Someone who fail to log into the original network, he must be working on the similar name with the exact password. But once he type the wrong password, he will be disconneted and redirected to the fake SSID. Fig. 9 Obtained SSID password
  • 4. International Journal of Engineering Trends and Technology (IJETT) – Volume 37 Number 3- July 2016 ISSN: 2231-5381 http://www.ijettjournal.org Page 168 Figure 9 illustrates the password has been found by the Linset tool. Once we note it on paper, we can disconnect the hardware and try to connect to the original SSID. Finally, we are connected. From now and then we can use the password forever as long as the owner do not change the password. If we just use for the common purpose, maybe it does not matter. However, if we force the Wi-Fi to download much content, they might realize what we have done to their networks. V. CONCLUSION In the global network, the security level is very crucial. Maybe we loose our valuable information because of our negligence. Using the penetration test is the best way to measure our safety level. Not all the SSID can be breached by this method. Maybe if the network owners do not have the security knowledge, it will be vulnerable. The debate is still in penetreation test and vulnerability. This tool is not intent to steal confidential information. It helps people to increase the security from gap found using the penetration test. REFERENCES [1] R. W. Beggs, Mastering Kali Linux for Advanced Penetration Testing, Birmingham: Packt Publishing, 2014. [2] A. Gupta, Kavita dan K. Kaur, “Vulnerability Assessment and Penetration Testing,” International Journal of Engineering Trends and Technology, vol. 4, no. 3, pp. 328-333, 2013. [3] A. G. Bacudio, 1. Yuan, B.-T. B. Chu dan M. Jones, “An Overview of Penetration Testing,” International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 6, pp. 19-38, 2011. [4] K. Xynos, I. Sutherland, H. Read, E. Everitt dan A. J. Blyth, “Penetration Testing And Vulnerability Assessments: A Professional Approach,” dalam International Cyber Resilience conference, Perth, 2010. [5] B.-H. Kang, “About Effective Penetration Testing Methodology,” Journal of Security Engineering, vol. 5, no. 5, pp. 425-432, 2008. [6] A. P. U. Siahaan, “The Weakness of Wireless Networks,” inSEMILOKA, Medan, 2011. AUTHORS PROFILE Akhyar Lubis was born in Medan, Indonesia, in 1983. He received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2006. He is now studying at AMIKOM Yogyakarta for his master degree in computer science. In 2008, he started to join the Faculty of Engineering, Universitas Pembangunan Panca Budi, as a Lecturer, and in 2016 became a Cisco Trainer. He has taught many networking students. He has always had many contributions in journal events. Andysah Putera Utama Siahaan was born in 1980, Medan, Indonesia. He received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2010, and in 2012, he obtained M.Kom. from the University of Sumatera Utara, Medan, Indonesia. In 2010, he joined as a lecturer at the Department of Engineering, Universitas Pembangunan Panca Budi. He has been a researcher since 2012. He has studied his Ph. D. degree from 2016. He is now active in writing international journals and conferences.