Mostrar el registro sencillo del ítem
Hacking Mobile Devices Using WiFi Pineapple Nano
dc.rights.license | All rights reserved | en_US |
dc.contributor.advisor | Duffany, Jeffrey | |
dc.contributor.author | Mojica Serrano, Alexis | |
dc.date.accessioned | 2020-06-01T15:59:50Z | |
dc.date.available | 2020-06-01T15:59:50Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | Mojica Serrano, A. (2019). Hacking mobile devices using WiFi Pineapple Nano [Unpublished manuscript]. Graduate School, Polytechnic University of Puerto Rico. | en_US |
dc.identifier.uri | http://hdl.handle.net/20.500.12475/141 | |
dc.description.abstract | Nowadays wireless access points can be found everywhere from fast food restaurants to private companies embracing Bring Your Own Device (BYOD) policies. These access points present a flexible solution in which different mobile devices can be connected to a wireless network and still perform effectively. Often the main concern with the use of access points is the lack of security they have. Most of the time users connect to wireless access points not knowing if they are genuine or malicious, or knowing of the vulnerabilities and risks that these represent to their devices and to their networks. Even more, they are not aware of the types of attacks that can come from “rogue” access points set up by Hackers, and the type of information they can capture. These Hackers use the lack of user awareness to their advantage to gain access to sensitive or confidential information. The objective of this assessment is to examine the effectiveness of the WiFi Pineapple Nano and how is used as a rogue access point to deceive users to connect to it. Part of the scenarios used in this research provided the opportunity to educate and promote user awareness. Key Terms ⎯ Man-in-the-middle (MITM), Rogue Access Points, Secure Socket Layer (SSL), Service Set Identifiers (SSID). | en_US |
dc.language.iso | en | en_US |
dc.publisher | Polytechnic University of Puerto Rico | en_US |
dc.relation.ispartof | Computer Science Program | |
dc.relation.ispartofseries | Spring-2019 | |
dc.relation.haspart | San Juan | en_US |
dc.subject | Man-in-the-middle (MITM) | en_US |
dc.subject | Rogue Access Points | en_US |
dc.subject | Secure Socket Layer (SSL) | en_US |
dc.subject | Service Set Identifiers (SSID) | en_US |
dc.subject.lcsh | Hacking | |
dc.subject.lcsh | Penetration testing (Computer security) | |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Research | |
dc.subject.lcsh | Polytechnic University of Puerto Rico--Graduate students--Posters | |
dc.title | Hacking Mobile Devices Using WiFi Pineapple Nano | en_US |
dc.type | Article | en_US |
dc.rights.holder | Polytechnic University of Puerto Rico, Graduate School | en_US |
Ficheros en el ítem
Este ítem aparece en la(s) siguiente(s) colección(ones)
-
Computer Science
Artículos de Proyectos de Ciencias en Computadoras