Trabajo Final De Carrera Seguridad En Comunicaciones Sin Hilo

Total Page:16

File Type:pdf, Size:1020Kb

Trabajo Final De Carrera Seguridad En Comunicaciones Sin Hilo Trabajo Final de Carrera Seguridad en Comunicaciones Sin Hilo: Riesgos y Amenazas Wi-Fi Autor: Mª Begoña Ortiz Leston Estudiante de Ingeniería Técnica en Telecomunicaciones Universitat Oberta de Catalunya (UOC) [email protected] 1 Agradecimientos A Luis y Eduardo por su cariño y comprensión. 2 Indice de Contenidos Agradecimientos ..................................................................................................................... 2 Indice de Contenidos .............................................................................................................. 3 Indice de Figuras .................................................................................................................... 4 Indice de Tablas ....................................................................................................................... 9 1. Introducción ...................................................................................................................... 11 1.1. Preámbulo .......................................................................................................... 11 1.2. Justificación y punto de partida ........................................................................ 11 1.3. Objeto y alcance .................................................................................................. 11 1.4. Objetivos específicos .......................................................................................... 12 1.5. Planificación del Proyecto .................................................................................. 12 2. Redes sin Hilo ……………………………........................................................................ 16 2.1. Introducción Redes sin Hilo .............................................................................. 16 2.2. Tipos Redes sin Hilo .......................................................................................... 17 2.3. Infrarrojos .......................................................................................................... 19 2.3.1. Clasificación de los sistemas infrarrojos .......................................................... 20 2.3.2. Sistemas IR punto a punto ................................................................................ 21 2.3.3. Sistemas IR difusos .......................................................................................... 22 2.4. Bluetooth ............................................................................................................. 23 2.4.1. Comunicación y conexión ................................................................................ 23 2.4.2. Implementación ................................................................................................ 23 2.4.3 Usos ................................................................................................................... 24 2.4.4 Especificaciones y características ...................................................................... 24 2.5. GPRS ................................................................................................................... 26 2.5.1. Características técnicas ..................................................................................... 26 2.5.2. Características del Sistema ............................................................................... 27 2.6. Redes de Datos UMTS (3G) .............................................................................. 29 2.6.1. Visión general ................................................................................................... 29 2.6.2. Velocidades de Datos ....................................................................................... 30 2.6.3. Seguridad .......................................................................................................... 30 2.6.4. Evolución .......................................................................................................... 31 2.7. 4G LTE - Long Term Evolution ....................................................................... 31 2.7.1. Comienzos de 4G LTE ..................................................................................... 31 2.7.2. Evolución .......................................................................................................... 32 2.7.3. Tecnologías ....................................................................................................... 32 2.7.4. Visión general de la especificación .................................................................. 33 2.8. WIMAX .............................................................................................................. 34 2.8.1. Mobile WiMAX ............................................................................................... 34 2.8.2. Componentes de WIMAX ................................................................................ 35 2.8.3. Seguridad .......................................................................................................... 36 2.8.4. Debilidades del WiMAX .................................................................................. 37 3. Redes Wi-Fi ....................................................................................................................... 39 3.1. Introducción a las Redes Wi-Fi ........................................................................ 39 3 3.2. Tecnología Wi-Fi ................................................................................................ 39 3.3. Familia de Tecnologías 802 ............................................................................... 41 3.3.1. Protocolos 802.11 ............................................................................................. 42 3.4. Topologías ......................................................................................................…. 45 3.4.1 Modo de Infraestructura .................................................................................... 45 3.4.2 Modo Ad-Hoc .................................................................................................... 47 3.5. Componentes de IEEE 802.11 .......................................................................... 48 3.6. Canales y frecuencias ........................................................................................ 49 3.7. Redes de Área Local Inalámbrica Uso y Alcance ........................................... 50 4. Seguridad Wi-Fi. Riesgos y Amenazas ........................................................................... 53 4.1. Proceso de Asociación de 802.11 ...................................................................... 53 4.2. Protocolos de Seguridad. WEP / WPA / WPA2 .............................................. 56 4.2.1 WEP ................................................................................................................... 56 4.2.2 WAP .................................................................................................................. 59 4.2.3 WPA2 ................................................................................................................ 60 4.3. Amenazas y Vulnerabilidades .......................................................................... 61 4.3.1 La Pérdida de la Confidencialidad ..................................................................... 61 4.3.2 La Pérdida de Integridad .................................................................................... 62 4.3.3 La Pérdida de Disponibilidad ............................................................................ 62 4.4. Ataques sobre Redes Wi-Fi .............................................................................. 63 4.4.1. Clasificación de los ataques ............................................................................. 63 4.5. DoS – Ataques de Denegación de Servicio ...................................................... 64 4.5.1. Saturación del Ambiente con Ruido de RF ...................................................... 64 4.5.2. Torrente de Autenticaciones ............................................................................. 65 4.5.3. WPA – Modificación de Paquetes .................................................................... 65 4.5.4. Desautenticación de Clientes ............................................................................ 66 4.6. Falsificación de Identidades .............................................................................. 67 4.6.1. Rogue Access Points – Honeypots ................................................................... 67 4.6.2. Wi-Phishing ...................................................................................................... 68 4.6.3. MAC Address Spoofing ................................................................................... 69 4.6.4. MITM – Man In The Middle ............................................................................ 70 4.6.5. Session Hijacking ............................................................................................. 71 4.7. Ataques de Intrusión ......................................................................................... 72 4.7.1. Romper claves WEP ......................................................................................... 72 4.7.2. Romper claves WPA ........................................................................................ 73 4.7.3. Ataque a Cisco EAP – LEAP ..........................................................................
Recommended publications
  • Wireless Local Area Networks: Threats and Their Discovery Using Wlans Scanning Tools Ms
    International Journal of Advanced Networking Applications (IJANA) ISSN No. : 0975-0290 137 Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools Ms. Rakhi Budhrani Bhavnagar, Gujarat, India. Dr. R. Sridaran, Dean, Faculty of Computer Applications, Marwadi Education Foundation’s Group of Institutions, Rajkot, Gujarat, India. ----------------------------------------------------------------------ABSTRACT-------------------------------------------------------- Wireless Local Area Networks frequently referred to as WLANs or Wi-Fi networks are all the passion in recent times. Wireless networks offer handiness, mobility, and can even be less expensive to put into practice than wired networks in many cases. But how far this technology is going provide a protected environment in terms of privacy is again an anonymous issue. Realizing the miscellaneous threats and vulnerabilities associated with 802.11-based wireless networks and ethically hacking them to make them more secure is what this paper is all about. On this segment, we'll seize a look at common threats, vulnerabilities related with wireless networks. This paper presents an overview some of the WLANs Scanning, Sniffing and Auditing tools available on the internet. This paper Reviews these tools along with their merits, demerits and how they can be used for hacking, exploiting security holes and their usage characterization in WLANs. Keywords - Current threats in WLANs, Exploiting Security, WLANs Scanning, WLANs Sniffing, Multifunctional, WLANs auditing tools penetrate any wired network via wireless network as Access Point (AP) is bridging between wireless and I. INTRODUCTION wired network. Wireless Networks present a host of issues for network managers. Unauthorized access he Institute of Electrical and Electronics points, broadcasted SSIDs, unknown stations, MITM Engineers (IEEE) provides 802.11 set of attacks such as session hijacking and spoofed MAC standards for WLANs.
    [Show full text]
  • The Apple Ecosystem
    APPENDIX A The Apple Ecosystem There are a lot of applications used to manage Apple devices in one way or another. Additionally, here’s a list of tools, sorted alphabetically per category in order to remain vendor agnostic. Antivirus Solutions for scanning Macs for viruses and other malware. • AVG: Basic antivirus and spyware detection and remediation. • Avast: Centralized antivirus with a cloud console for tracking incidents and device status. • Avira: Antivirus and a browser extension. Avira Connect allows you to view device status online. • BitDefender: Antivirus and malware managed from a central console. • CarbonBlack: Antivirus and Application Control. • Cylance: Ransomware, advanced threats, fileless malware, and malicious documents in addition to standard antivirus. • Kaspersky: Antivirus with a centralized cloud dashboard to track device status. © Charles Edge and Rich Trouton 2020 707 C. Edge and R. Trouton, Apple Device Management, https://doi.org/10.1007/978-1-4842-5388-5 APPENDIX A THe AppLe ECOSYSteM • Malware Bytes: Antivirus and malware managed from a central console. • McAfee Endpoint Security: Antivirus and advanced threat management with a centralized server to track devices. • Sophos: Antivirus and malware managed from a central console. • Symantec Mobile Device Management: Antivirus and malware managed from a central console. • Trend Micro Endpoint Security: Application whitelisting, antivirus, and ransomware protection in a centralized console. • Wandera: Malicious hot-spot monitoring, jailbreak detection, web gateway for mobile threat detection that integrates with common MDM solutions. Automation Tools Scripty tools used to automate management on the Mac • AutoCasperNBI: Automates the creation of NetBoot Images (read: NBI’s) for use with Casper Imaging. • AutoDMG: Takes a macOS installer (10.10 or newer) and builds a system image suitable for deployment with Imagr, DeployStudio, LANrev, Jamf Pro, and other asr or Apple Systems Restore-based imaging tools.
    [Show full text]
  • Wi-Fi Network Applications for Apple Mac OS X
    Published on Jisc community (https://community.jisc.ac.uk) Home > Advisory services > Wireless Technology Advisory Service > Guides > Wi-Fi Network applications for Apple Mac OS X Wi-Fi Network applications for Apple Mac OS X By Pranay Pancholi, Loughborough University 26/3/2014 Whilst there is a large choice of Wi-Fi analytical tools available for the PC market, the choice available to MAC OS X users is somewhat limited. This document provides an overview of 8 applications – some are free and others have a cost - that can be used to assist with Wi-Fi stumbling and surveying on Mac OS X. They can help in various ways to troubleshoot and diagnose wireless connectivity issues in the field: Mac OS X Wi-Fi Scanner iStumbler Chanalyzer for Mac NetSpot zPerf WiSpy WiFi Signal WiFi Explorer Mac OS X Wi-Fi Scanner System Requirements: OS X 10.7 or later Price: Free If you have OS X 10.7 or above there is now a useful built-in Wi-Fi scanner utility, which is used to discover nearby available wireless networks. 1. Select option button followed by pressing on Airport icon on the menu bar. From the drop down list select Open Wireless Diagnostics. 2. When prompted, enter your administrator name and password. 3. The Wireless Diagnostics window will appear, asking you to follow on screen instructions. 4. From the menu bar select Window followed by Utilities to open the Mac Wi-Fi Scanner application. Alternatively you can also press CMD+2 to open the application. The Utilities window opens and presents you with five options: Info – Displays all network information about the AP to which your device is currently associated.
    [Show full text]
  • Magazines About Food Or Even Homemaking (And Their Associated Sites) Or Visit Food Products Websites You Are No Longer Taking Cooking 101
    Masthead Publisher MPN, LLC Editor-in-Chief Robert L. Pritchett Assistant Editors Harry Babad Michele Patterson Consultants Harry {doc} Babad Ted Bade Advertising and Marketing Director Robert L. Pritchett Web Master Robert L. Pritchett Public Relations Robert L. Pritchett Contacts Webmaster at macCompanion dot com Feedback at macCompanion dot com Correspondence 1952 Thayer, Drive, Richland, WA 99352 USA 1-509-210-0217 1-888-684-2161 rpritchett at macCompanion dot com Skype: maccompanion macCompanion Staff Harry {doc} Babad Ted Bade Matt Brewer (MacFanatic) Dr. Eric Flescher Kale Feelhaver (AppleMacPunk) Jonathan Hoyle III Eddie Hargreaves Daphne Kalfon (I Love My Mac) Wayne Lefevre Daniel MacKenzie (Tech Fanatic) Michele Patterson (Dixie Graphics) Mike Potter (For Mac Eyes Only) Robert Pritchett Dennis Sellers (Macsimum News) Rick Sutcliffe (The Northern Spy) Mike Swope (Swope Design) Tim Verpoorten (Surfbits) Julie M. Willingham Guest Authors Daniel Eran Dilger, RoughlyDrafted Michelle LaBrosse, Cheetah Learning Terry White, Tech Blog Application Service Provider for the macCompanion website: http://www.stephousehosting.com Our special thanks to all those who have allowed us to review their products! In addition, thanks to you, our readers, who make this effort all possible. MPN, LLC Copyright 2003-2007 Page 2 of 149 Volume 5 Issue 8 August 2007 MPN, LLC Copyright 2003-2007 Page 3 of 149 Volume 5 Issue 8 August 2007 MPN, LLC Copyright 2003-2007 Page 4 of 149 Volume 5 Issue 8 August 2007 ______________________________________________
    [Show full text]
  • Wifivienfo Download for Windows 10 Wifiinfoview for Windows
    wifivienfo download for windows 10 WifiInfoView for Windows. WifiInfoView is a free utility tool that gives users detailed information about all available wireless networks in the vicinity. Designed for Windows, the software monitors each network and comes up with details like router name and model, channel number, MAC address, signal quality, and more. With this data, users can find and connect to a Wi-Fi channel that’s fast and has fewer users. The beginner-friendly application doesn’t require any installation and lets users export all data. What is WifiInfoView? If you’re a Microsoft Windows user, you must be aware of the limited information the OS provides about available Wi-Fi networks. That means, when you’re struggling with slow network speeds, you have no technical information to help you locate and solve the problem. WifiInfoView download is a handy tool that can get you details about all the networks available in your vicinity without much effort. Once launched, the app runs a comprehensive scan and displays information such as signal quality , frequency band, SSID or network name, channel number, router model, BSS type, and MAC address. With these details at your disposal, you can make a few changes to your network connection and get a stronger and faster signal . Does the app have a simple installation process? After you complete WifiInfoView download , you don’t need to go through an installation process. Instead, you need to click on the executable file that you have and run the program. Once launched, the app starts to scan all available networks and starts displaying them on the dashboard.
    [Show full text]
  • Optimalizace Univerzitní Bezdrátové Sítě Pro Provoz Hlasových Služeb
    Mendelova univerzita v Brně Provozně ekonomická fakulta Optimalizace univerzitní bezdrátové sítě pro provoz hlasových služeb Diplomová práce Vedoucí práce: Bc. Jakub Konečný Ing. Petr Zach Brno 2015 Rád bych touto formou poděkovat vedoucímu mé práce, Ing. Petru Zachovi, za všechnu pomoc, kterou mi poskytl během tvorby této diplomové práce. Bez něj bych se hlavně v prvotní záplavě ITU-T dokumentů zorientoval jen velmi těžko. Čestné prohlášení Prohlašuji, že jsem tuto práci: Optimalizace univerzitní bezdrátové sítě pro provoz hlasových služeb vypracoval samostatně a veškeré použité prameny a informace jsou uvedeny v se- znamu použité literatury. Souhlasím, aby moje práce byla zveřejněna v souladu s § 47b zákona č. 111/1998 Sb., o vysokých školách ve znění pozdějších předpisů, a v souladu s platnou Směrnicí o zveřejňování vysokoškolských závěrečných prací. Jsem si vědom, že se na moji práci vztahuje zákon č. 121/2000 Sb., autorský zákon, a že Mendelova univerzita v Brně má právo na uzavření licenční smlouvy a užití této práce jako školního díla podle § 60 odst. 1 Autorského zákona. Dále se zavazuji, že před sepsáním licenční smlouvy o využití díla jinou osobou (subjektem) si vyžádám písemné stanovisko univerzity o tom, že předmětná licenční smlouva není v rozporu s oprávněnými zájmy univerzity, a zavazuji se uhradit pří- padný příspěvek na úhradu nákladů spojených se vznikem díla, a to až do jejich skutečné výše. V Brně dne 15. května 2015 .................................................... Abstract Konečný, Jakub. Optimalization of the university wireless network for voice servi- ces traffic. Brno, 2015. Diploma thesis. Mendel University in Brno. Thesis supervisor Ing. Petr Zach. This diploma thesis focuses on the issue of evaluation VoIP services (from the perspective of QoE) and their quality in university network.
    [Show full text]
  • Mac Change Software Update
    Mac change software update To check for Mac software updates, use the App Store app on your Mac. Click Updates in the App Store toolbar, then use the Update buttons to download and. Automatic Updates has been possible for Mac apps for quite some time, but Manual software update in OS X Yosemite with App Store option . I know that I am actually just changing the one set in Yosemite for the official. And not to worry, if you decide you want to change this at a later date Opt Out of Showing Pre-Release Beta Software Updates for Mac OS X. So, here's how to enable or disable Mac OS X auto update in El Capitan or Yosemite. the new options in Yosemite allow encompassing all software updates. How to update software on your Mac . To look at or change your macOS and apps update settings, click on App Store in the menu bar and. MacDaddy does not change the hardware burned-in MAC addresses. MacDaddy changes the "software based" MAC addresses. Nice looking app, but MacDaddy X doesn't work on OS X with the latest security updates and Gitmac. For Pro Tools and Pro Tools HD software on computers with Mac OS X x (Snow The following are the most recent updates for Pro Tools MP . Pro Tools system to another by pressing a single switch on the D-Control console. LPT: Update your Mac with the softwareupdate command line tool for a I updated 30 mins ago and it didn't change my battery level at the.
    [Show full text]
  • Site Survey by Ekahau Full Cracked Version of Microsoft
    1 / 5 Site Survey By Ekahau Full Cracked Version Of Microsoft Mar 3, 2017 - Ekahau Site Survey Pro version 9.2.3 license key (activation), Only for ... 11.4.209 minecraft microsoft windows 10 pro ... antivirus EKAHAU ... crack .... Version 8.1 of Ekahau Site Survey and Wi ... Download Ekahau Site Survey Full Cracked Ekahau Site Survey 7 Downloads Sample Results From Member .... AirMagnet Survey PRO Netally, Wireless Site Survey Software, Distributor NetAlly ... Certified to use AirMagnet Survey (or the Professional version) to survey ... that the contact is a Microsoft Agent or Microsoft Employee and that the phone ... based on various sources of credible research. ekahau pro 10 crack, Dec 03, 2018 .... NetSpot helps you visualize WiFi, run wireless site surveys & analyze Wi-Fi on ... Why do you need to carry out a site survey?. photoshop elements 11 serial mac. ... well as their signal Download latest version of Ekahau HeatMapper for Windows. ... Download Microsoft Office for Mac - Best Software & Apps. OS X: Installing .... Ls Models Ls Land Issue 15 Thumbelina Issue 28 Fairy Garden Reallola 14sets Rar ... >site survey by ekahau full cracked version of microsoft #freetoedit. HeatMapper is the little brother of Ekahau Wi-Fi Site Survey and Planner ... Ekahau Site Survey 8.5 Download Full Cracked x86 x64 Ekahau Site Survey 8.5 PC–Mac. ... The Mac version works quite similarly as the Windows version already, ... Download Firefox Mac Os X 10.6 8 · Free Download Of Microsoft .... (Microsoft Word - \244p\273\241\273P\252\300\267|.doc) 98 學 年 度 第 2 學 期 課 程 學 習 心 得 報 告 ..
    [Show full text]
  • Design Guide: RUCKUS Site Surveys for Hospitality Best Practice
    Best Practice Design Guide Site Surveys for Hospitality December 2020 Site Surveys for Hospitality Table of Contents INTENDED AUDIENCE ....................................................................................................................... 4 OVERVIEW ....................................................................................................................................... 5 Site Surveys .................................................................................................................................................................. 6 Hospitality Landscape ................................................................................................................................................... 6 Building Standards ...................................................................................................................................................................6 Brand and Aesthetic Standards ...............................................................................................................................................6 Hospitality Network Challenges...............................................................................................................................................7 Existing Network Audit ............................................................................................................................................................8 WLAN Deployment Area Best Practices ..................................................................................................................................9
    [Show full text]
  • [ Team Lib ] Table of Contents Index Reviews Reader Reviews Errata
    This document is created with the unregistered version of CHM2PDF Pilot [ Team LiB ] Table of Contents Index Reviews Reader Reviews Errata Wireless Hacks By Rob Flickenger Publisher: O'Reilly Pub Date: September 2003 ISBN: 0-596-00559-8 Pages: 304 Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done. [ Team LiB ] This document is created with the unregistered version of CHM2PDF Pilot [ Team LiB ] Table of Contents Index Reviews Reader Reviews Errata Wireless Hacks By Rob Flickenger Publisher: O'Reilly Pub Date: September 2003 ISBN: 0-596-00559-8 Pages: 304 Copyright Credits About the Author Contributors Acknowledgments Foreword Preface Why Wireless Hacks? How to Use This Book How This Book Is Organized Conventions Used in This Book How to Contact Us Chapter 1. The Standards Section 1.1. Hacks #1-12 Hack 1. 802.11: The Mother of All IEEE Wireless Ethernet Hack 2. 802.11a: The Betamax of the 802.11 Family Hack 3. 802.11b: The De Facto Standard Hack 4. 802.11g: Like 802.11b, only Faster Hack 5. 802.16: Long Distance Wireless Infrastructure Hack 6. Bluetooth: Cable Replacement for Devices Hack 7. 900 MHz: Low Speed, Better Coverage Hack 8. CDPD, 1xRTT, and GPRS: Cellular Data Networks Hack 9. FRS and GMRS: Super Walkie-Talkies Hack 10.
    [Show full text]
  • ISSPM Slide-8 Training Course FISMA-NIST Section
    INFORMATION SYSTEMS SECURITY PROGRAM MANAGEMENT FISMA / NIST REFERENCE SECTION VERSION 1 LAST UPDATE 2/22/10 MODULE 1 INTRODUCTION TO INFORMATION SECURITY MANAGEMENT INTRODUCTION TO INFORMATION SYSTEMS SECURITY MANAGEMENT REVIEW Presentation: Information Security Governance.pdf NIST SP 800-100: Chapter 2 Information Security Governance.pdf NIST SP 800-100: Information Security Governance Frequently Asked Questions.pdf NIST Glossary Of Key Information Security Terms.pdf NIST SP 800-100: Acronyms List.pdf Information Security Terminology.pdf Data Lifecycle Security.pdf Information Technology / Information Security Essential Body Of Knowledge.pdf Information Security Regulations And Compliance Management-Video Based.url REFERENCE NIST SP 800-100: Information Security Handbook-Guide For Managers.pdf NIST SP 800-14: Generally Accepted Principles For Securing IT Systems.pdf CERT-Governing for Enterprise Security Implementation Guide.pdf Effective Versus In-Effective Security Governance.pdf FEDERAL AGENCIES SECURITY HANDBOOKS Health And Human Services Information Security Program Handbook.pdf Dept. Of Commerce IT Security Program Policy And Minimum Implementation Standards.pdf Dept. Of Veterans Affairs Information Security Handbook.pdf USDA Information Security Program Manual.pdf CMS Policy For The Information Security Program.pdf Dept. Of Energy IT Security Architecture.pdf IA POLICY CHARTS DOD IA Policy Chart / Trusted GIG IA Policy Chart.url MODULE 2A FISMA / FEDERAL INFORMATION SECURITY MANAGEMENT ACT REVIEW Presentation: FISMA Overview.pdf Presentation: FISMA Implementation Project.pdf FISMA Security Controls Overview.pdf FISMA Steps.pdf OMB/NIST Guidance On New FISMA Metrics OMB/NIST Release Draft Of New FISMA Metrics.url OMB-FY2010 Security Metrics.pdf FISMA Reporting For 2010.url REFERENCE FISMA FISMA Implementation Project.url Appendix III to OMB Circular No.
    [Show full text]
  • Advances in Natural and Applied Sciences Study of Honeypots
    Advances in Natural and Applied Sciences, 8(17) Special 2014, Pages: 48-59 AENSI Journals Advances in Natural and Applied Sciences ISSN:1995-0772 EISSN: 1998-1090 Journal home page: www.aensiweb.com/ANAS Study of Honeypots: Analysis of WiFi_Honeypots and Honeypots tools 1Poonkuntran.S and 2Arun Anoop M 1Professor,Velammal College of Engineering and Technology, Madurai-09, Tamilnadu, India 2Assistant Professor, MES Engineering College, Kuttipuram, Malapuram(Dt.), Kerala, India ARTICLE INFO ABSTRACT Article history: Background: Fake access point (AP) is one of the serious threat in WLANs. The Received 3 September 2014 password stealing and hijacking of cookies are done by the hackers mostly through fake Received in revised form 30 October access points. WiFi honeypot is under Rogue_AP. Fake_AP is also under Rogue_AP. 2014 And both have same functionalities. Wifi Honeypot is same as Fake_AP.Accessing free Accepted 4 November 2014 access points in public malls leads unusual malicious attacks. Such situations demand an analysis of usage of the data through access points in different places. In this paper, Keywords: we propose an analysis of fake access point(WiFi Honeypots) detection tools and Fake access point, WiFi honeypot, normal Honeypots tools. In Fake_AP, hackers create a TRAP to steal or sniff secret honey pots, information such as passwords and other valuable informations. Honeypot mimic session hijacking, Kali web_server to TRAP hackers. Honeypot is a TRAP set to detect attempts at Linux,Sniffing,spoofing, unauthorized access to a system. Honeypot would capture and collect all attempts of Rogue_access point hacker. Some of the hackers use honeypots to sniff the SSIDs in order to conduct a SSID_spoofing.
    [Show full text]