Skip to Main content Skip to Navigation
Conference papers

Evil-AP - Mobile Man-in-the-Middle Threat

Abstract : Clients of public hotspots are exposed to various threats including a man–in–the–middle attacks. To stress existing threats we created the Evil-AP application for demonstrating a man–in–the–middle attack. The application, installed on an Android phone with root permissions, turns on hotspot services and performs network redirection. We tested as the proposed techniques can be used to eavesdrop, redirect, inject, and strip the Internet traffic. A mobility of the created solution together with the wide functionality creates an extremely dangerous tool. Therefore, we concluded our work with good practices that allow the users to avoid similar threats as described in our work.
Complete list of metadata

Cited literature [11 references]  Display  Hide  Download

https://hal.inria.fr/hal-01656261
Contributor : Hal Ifip <>
Submitted on : Tuesday, December 5, 2017 - 2:59:39 PM
Last modification on : Wednesday, December 6, 2017 - 1:21:01 AM

File

448933_1_En_53_Chapter.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Kamil Breński, Maciej Chołuj, Marcin Luckner. Evil-AP - Mobile Man-in-the-Middle Threat. 16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.617-627, ⟨10.1007/978-3-319-59105-6_53⟩. ⟨hal-01656261⟩

Share

Metrics

Record views

208

Files downloads

151