Wi-Fi Redux: Never Trust Untrusted Networks

Abstract

This study analyzes the dangers posed to computer user information and their equipment as they connect to untrusted networks, such as those found in coffee shops. Included in this study is a virtualized lab consisting of the target and attacker nodes and router to facilitate communication. Also included are a binary for reverse connection and a modified binary that was created to connect back to the attacker node and bypasses most Anti-virus software.

Authors and Affiliations

Young B. Choi, Kenneth P. LaCroix

Keywords

Related Articles

Wireless Sensor Networks for Road Traffic Monitoring

Wireless Sensor Networks (WSNs) consist of large number of sensor nodes. Each node is empowered by a com-munication interface that is mainly characterized by low power, short transmission distance and minimal data rate s...

Ranking Method in Group Decision Support to Determine the Regional Prioritized Areas and Leading Sectors using Garrett Score

The main objective of regional development is to achieve equal development in different regions. However, the long duration and complexity of the process may result in the unequal development of some regions. In order to...

Cryptic Mining in Light of Artificial Intelligence

The analysis of cryptic text is hard problem”, and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algor...

Forensic Analysis using Text Clustering in the Age of Large Volume Data: A Review

Exploring digital devices in order to generate digital evidence related to an incident being investigated is essential in modern digital investigation. The emergence of text clustering methods plays an important role in...

An Algorithm Research for Supply Chain Management Optimization Model

In this paper, we consider the extended linear complementarity problem on supply chain management optimization model. We first give a global error bound for the extended linear complementarity problem, and then propose a...

Download PDF file
  • EP ID EP258364
  • DOI 10.14569/IJACSA.2017.080448
  • Views 103
  • Downloads 0

How To Cite

Young B. Choi, Kenneth P. LaCroix (2017). Wi-Fi Redux: Never Trust Untrusted Networks. International Journal of Advanced Computer Science & Applications, 8(4), 352-355. https://europub.co.uk/articles/-A-258364