Research on WiFi Penetration Testing with Kali Linux
Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analys...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2021/5570001 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832568487704264704 |
---|---|
author | He-Jun Lu Yang Yu |
author_facet | He-Jun Lu Yang Yu |
author_sort | He-Jun Lu |
collection | DOAJ |
description | Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network. |
format | Article |
id | doaj-art-35094be078304b2ca2eb142c88871bf1 |
institution | Kabale University |
issn | 1076-2787 1099-0526 |
language | English |
publishDate | 2021-01-01 |
publisher | Wiley |
record_format | Article |
series | Complexity |
spelling | doaj-art-35094be078304b2ca2eb142c88871bf12025-02-03T00:58:58ZengWileyComplexity1076-27871099-05262021-01-01202110.1155/2021/55700015570001Research on WiFi Penetration Testing with Kali LinuxHe-Jun Lu0Yang Yu1The School of Big Data and Artificial Intelligence, Anhui Xinhua University, Hefei, Anhui 230088, ChinaScience and Technology on Reactor System Design Technology Labortory, Nuclear Power Institute of China, Chengdu, Sichuan 610213, ChinaAiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network.http://dx.doi.org/10.1155/2021/5570001 |
spellingShingle | He-Jun Lu Yang Yu Research on WiFi Penetration Testing with Kali Linux Complexity |
title | Research on WiFi Penetration Testing with Kali Linux |
title_full | Research on WiFi Penetration Testing with Kali Linux |
title_fullStr | Research on WiFi Penetration Testing with Kali Linux |
title_full_unstemmed | Research on WiFi Penetration Testing with Kali Linux |
title_short | Research on WiFi Penetration Testing with Kali Linux |
title_sort | research on wifi penetration testing with kali linux |
url | http://dx.doi.org/10.1155/2021/5570001 |
work_keys_str_mv | AT hejunlu researchonwifipenetrationtestingwithkalilinux AT yangyu researchonwifipenetrationtestingwithkalilinux |