Evil-AP - Mobile Man-in-the-Middle Threat - Archive ouverte HAL Access content directly
Conference Papers Year : 2017

Evil-AP - Mobile Man-in-the-Middle Threat

(1) , (1) , (1)
Kamil Breński
  • Function : Author
  • PersonId : 1024498
Maciej Chołuj
  • Function : Author
  • PersonId : 1024499
Marcin Luckner
  • Function : Author
  • PersonId : 1024455


Clients of public hotspots are exposed to various threats including a man–in–the–middle attacks. To stress existing threats we created the Evil-AP application for demonstrating a man–in–the–middle attack. The application, installed on an Android phone with root permissions, turns on hotspot services and performs network redirection. We tested as the proposed techniques can be used to eavesdrop, redirect, inject, and strip the Internet traffic. A mobility of the created solution together with the wide functionality creates an extremely dangerous tool. Therefore, we concluded our work with good practices that allow the users to avoid similar threats as described in our work.
Fichier principal
Vignette du fichier
448933_1_En_53_Chapter.pdf (8.15 Mo) Télécharger le fichier
Origin : Files produced by the author(s)

Dates and versions

hal-01656261 , version 1 (05-12-2017)


Attribution - CC BY 4.0



Kamil Breński, Maciej Chołuj, Marcin Luckner. Evil-AP - Mobile Man-in-the-Middle Threat. 16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM), Jun 2017, Bialystok, Poland. pp.617-627, ⟨10.1007/978-3-319-59105-6_53⟩. ⟨hal-01656261⟩
164 View
65 Download



Gmail Facebook Twitter LinkedIn More