Research on WiFi Penetration Testing with Kali Linux

Complexity 2021:1-8 (2021)
  Copy   BIBTEX

Abstract

Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network.

Links

PhilArchive



    Upload a copy of this work     Papers currently archived: 92,323

External links

Setup an account with your affiliations in order to access resources via your University's proxy server

Through your library

Similar books and articles

The Phalaharini Kali.Swami Narasimhananda - 2016 - Prabuddha Bharata or Awakened India 121 (1):9-22.
Wireless Network Security: Challenges, Threats and Solutions. A Critical Review.Lusekelo Kibona & Hassana Ganame - 2018 - International Journal of Academic Multidisciplinary Research (IJAMR) 4 (2):19-26.
Free wifi here.Jamie Allen - 2018 - Continent 7 (1).
NASD Rule 2110 and the VA Linux IPO.Tim Loughran - 2005 - Journal of Business Ethics 62 (2):141-146.

Analytics

Added to PP
2021-02-28

Downloads
10 (#1,199,473)

6 months
7 (#440,136)

Historical graph of downloads
How can I increase my downloads?

Citations of this work

No citations found.

Add more citations

References found in this work

No references found.

Add more references