![]() It uses radio waves to transmit signals and needs to establish a connection before it can be used therefore, the channel is more likely to be monitored and to be attacked by intermediaries. ![]() The Wireless network itself has some vulnerabilities. Wireless Fidelity (WiFi) is a current wireless network model based on the IEEE 802.11 standard. More and more researchers pay attention to networks’ security and calculations. Especially in recent years, with the wide use of smart terminals such as smartphones, which bring great convenience to our daily life, the information security problems arising therefrom are also increasing. With the rapid development and wide application of wireless network technology, the problem of information security becomes more and more important. The experimental results show that the method of WiFi network penetration testing with Kali Linux has a good effect on improving the security evaluation of WiFi network. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. ![]() Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |