Wi-Fi Redux: Never Trust Untrusted Networks

Abstract

This study analyzes the dangers posed to computer user information and their equipment as they connect to untrusted networks, such as those found in coffee shops. Included in this study is a virtualized lab consisting of the target and attacker nodes and router to facilitate communication. Also included are a binary for reverse connection and a modified binary that was created to connect back to the attacker node and bypasses most Anti-virus software.

Authors and Affiliations

Young B. Choi, Kenneth P. LaCroix

Keywords

Related Articles

Digital Legacy: Posterity Rights Analysis and Proposed Model for Digital Memorabilia Adoption using Machine Learning

The paper informs about the digital legacy and its related concepts of posterity rights and digital memorabilia. It also deals with the right to exercise the digital posterity concerning the social networking profiles (S...

On the Parallel Design and Analysis for 3-D ADI Telegraph Problem with MPI

In this paper we describe the 3-D Telegraph Equation (3-DTEL) with the use of Alternating Direction Implicit (ADI) method on Geranium Cadcam Cluster (GCC) with Message Passing Interface (MPI) parallel software. The algor...

Omega Model for Human Detection and Counting for application in Smart Surveillance System

Driven by the significant advancements in technology and social issues such as security management, there is a strong need for Smart Surveillance System in our society today. One of the key features of a Smart Surveillan...

Skew Detection/Correction and Local Minima/Maxima Techniques for Extracting a New Arabic Benchmark Database

We propose a set of techniques for extracting a new standard benchmark database for Arabic handwritten scripts. Thresholding, filtering, and skew detection/correction techniques are developed as a pre-processing step of...

Action Recognition using Key-Frame Features of Depth Sequence and ELM

Recently, the rapid development of inexpensive RGB-D sensor, like Microsoft Kinect, provides adequate information for human action recognition. In this paper, a recognition algorithm is presented in which feature represe...

Download PDF file
  • EP ID EP258364
  • DOI 10.14569/IJACSA.2017.080448
  • Views 83
  • Downloads 0

How To Cite

Young B. Choi, Kenneth P. LaCroix (2017). Wi-Fi Redux: Never Trust Untrusted Networks. International Journal of Advanced Computer Science & Applications, 8(4), 352-355. https://europub.co.uk/articles/-A-258364