Font Size: a A A

Research On Wireless Network Security Testing Based On Metasploit Exploits

Posted on:2017-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:MUIRURI JEFFFull Text:PDF
GTID:2308330509953141Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
Since the turn of the 21 st century, internet security has become an area of interest from the basic household to the mega companies. Our reliance on the internet of things has necessitated security systems with adaptability that is as fast as the technological turnover. The risks to users of wireless technology have increased as the service has become more popular. There were relatively few dangers when wireless technology was first introduced. Hackers had not yet had time to latch on to the new technology, and wireless networks were not commonly found in the work place. However, there are many security risks associated with the current wireless protocols and encryption methods, and in the carelessness and ignorance that exists at the user and corporate IT level. Hacking methods have become much more sophisticated and innovative with wireless access. Hacking has also become much easier and more accessible with easy-to-use Windows- or Linux-based tools being made available on the web at no charge.This article in wireless network security, introduces the security system analysis of the current network security analysis tools and techniques, it mainly introduces the use of Metasploit tools and processes. In the Metasploit environment using Aircrack-NG, the simulation shows the entire process of scanning and penetration attacks. Using windows operating system, the access to the same wireless network is introduced in detail, using Metasploit scanning and analysis,open ports are found and appropriate module attack and attack load are set。Following selection and execution parameters can be set after penetration attacks.Compared to the traditional penetration tool, it is necessary to have a strong professional knowledge to carry out the analysis; the integration of the use of the penetration tool is simple and easy to use. Through the above work familiar tools are used for penetration, uncovering the hacker is accomplished using the wireless network penetration attack method, enhancing the awareness of network security, finding safety in hidden trouble, thus take timely measures to protect your computer, to achieve security in wireless network.
Keywords/Search Tags:Internet Access, Network, Wireless Technology, Hack, Metasploit, Security, Penetration Testing
PDF Full Text Request
Related items