Evil-AP - Mobile Man-in-the-Middle Threat

Fiche du document

Date

16 juin 2017

Type de document
Périmètre
Langue
Identifiants
Relations

Ce document est lié à :
info:eu-repo/semantics/altIdentifier/doi/10.1007/978-3-319-59105-6_53

Collection

Archives ouvertes

Licences

http://creativecommons.org/licenses/by/ , info:eu-repo/semantics/OpenAccess



Citer ce document

Kamil Breński et al., « Evil-AP - Mobile Man-in-the-Middle Threat », HAL-SHS : sciences de l'information, de la communication et des bibliothèques, ID : 10.1007/978-3-319-59105-6_53


Métriques


Partage / Export

Résumé En

Clients of public hotspots are exposed to various threats including a man–in–the–middle attacks. To stress existing threats we created the Evil-AP application for demonstrating a man–in–the–middle attack. The application, installed on an Android phone with root permissions, turns on hotspot services and performs network redirection. We tested as the proposed techniques can be used to eavesdrop, redirect, inject, and strip the Internet traffic. A mobility of the created solution together with the wide functionality creates an extremely dangerous tool. Therefore, we concluded our work with good practices that allow the users to avoid similar threats as described in our work.

document thumbnail

Par les mêmes auteurs

Sur les mêmes sujets

Sur les mêmes disciplines

Exporter en