Penetration testing: Concepts, attack methods, and defense strategies
- 1 April 2016
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Penetration testing helps to secure networks, and highlights the security issues. In this paper investigate different aspects of penetration testing including tools, attack methodologies, and defense strategies. More specifically, we performed different penetration tests using a private networks, devices, and virtualized systems and tools. We predominately used tools within the Kali Linux suite. The attacks we performed included: smartphone penetration testing, hacking phones Bluetooth, traffic sniffing, hacking WPA Protected Wifi, Man-in-the-Middle attack, spying (accessing a PC microphone), hacking phones Bluetooth, and hacking remote PC via IP and open ports using advanced port scanner. The results are then summarized and discussed. The paper also outlined the detailed steps and methods while conducting these attacks.Keywords
This publication has 11 references indexed in Scilit:
- A survey on lightweight block ciphers for low-resource devices: Comparative study and open issuesJournal of Network and Computer Applications, 2015
- An Enhanced WLAN Security System With FPGA Implementation for Multimedia ApplicationsIEEE Systems Journal, 2015
- A Green Approach for Selfish Misbehavior Detection in 802.11-Based Wireless NetworksMobile Networks and Applications, 2015
- Performance and Information Security Evaluation with FirewallsInternational Journal of Security and Its Applications, 2013
- An energy‐efficient and security aware route selection protocol for wireless sensor networksSecurity and Communication Networks, 2013
- Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count DiscrepanciesMobile Networks and Applications, 2011
- Source—destination obfuscation in wireless ad hocnetworksSecurity and Communication Networks, 2011
- On limited-range strategic/random jamming attacks in wireless ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009