Skip to main content

Towards Ethical Hacking—The Performance of Hacking a Router

  • Chapter
  • First Online:
Information Security Technologies for Controlling Pandemics

Abstract

The increase and advancements of network technology play a significant role in the lives of us. This is through homes, businesses and people in a professional and social capacity. The way we use technology in everyday life aids the friendships, achievements and entertainment parts of our day to day life. This makes the fundamental device in the network important to every one of us for conducting our day to day life–that device is the router. Much like a fridge or cooker would have in the 1950 s, the router is considered as a critical device in the home and business setting. This paper aims to demonstrate a penetration test documentation of a standard home or small business Router–TP-Link WR940N by using the operating system Kali Linux 2019/2020. The main aim of the paper is to show the extent of what someone can do and the lengths someone can go from essentially sitting outside your house in a car with a raspberry pi, a Wi-Fi adapter, a seven-inch screen, and a travel battery for power.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shebli HMZA, Beheshti BD (2018) A study on penetration testing process and tools. In: 2018 IEEE long island systems, applications and technology conference (LISAT), Farmingdale, NY, 2018, pp 1-7. https://doi.org/10.1109/LISAT.2018.8378035

  2. Trabelsi Z, Ibrahim W (2013) Teaching ethical hacking in information security curriculum: a case study. In: 2013 IEEE global engineering education conference (EDUCON). https://doi.org/10.1109/educon.2013.6530097

  3. Maraj A, Jakupi G, Rogova E, Grajqevci X (2017) Testing of network security systems through DoS attacks. In: 2017 6th mediterranean conference on embedded computing (MECO). https://doi.org/10.1109/meco.2017.7977239

  4. Visoottiviseth V, Akarasiriwong P, Chaiyasart S, Chotivatunyu S (2017) PENTOS: penetration testing tool for internet of thing devices. In: TENCON 2017–2017 IEEE region 10 conference. https://doi.org/10.1109/tencon.2017.8228241

  5. Devi RS, Kumar MM (2020) Testing for security weakness of web applications using ethical hacking. In: 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184). https://doi.org/10.1109/icoei48184.2020.9143018

  6. Xuan S, Wang H, Gao D, Chung I, Wang W, Yang W (2019) Network penetration identification method based on interactive behavior analysis. In: 2019 seventh international conference on advanced cloud and big data (CBD). https://doi.org/10.1109/cbd.2019.00046

  7. Cardwell K (2014) Building virtual pentesting labs for advanced penetration testing. Packt Publishing Ltd

    Google Scholar 

  8. Denis M, Zena C, Hayajneh T (2016) Penetration testing: concepts, attack methods, and defense strategies. In: 2016 IEEE long island systems, applications and technology conference (LISAT). IEEE, pp 1–6

    Google Scholar 

  9. Epling L, Hinkel B, Hu Y (2015) Penetration testing in a box. In: Proceedings of the 2015 information security curriculum development conference, pp 1–4

    Google Scholar 

  10. Singhal TC (2009) Method and apparatus for network security using a router based authentication system. U.S. Patent 7,519,986

    Google Scholar 

  11. Wang Y, Jin Z, Zhao X (2010) Practical defense against wep and wpa-psk attack for wlan. In: 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–4

    Google Scholar 

  12. Tools.kali.org. (2020) https://tools.kali.org/wireless-attacks/wifite. Accessed 26 March 2020

  13. By&nbsp:KaliTools (2020) Airgeddon - Penetration Testing Tools. [online] En.kali.tools. https://en.kali.tools/?p=249. Accessed 26 March 2020

  14. kali.org. (2020) https://tools.kali.org/exploitation-tools/routersploit. Accessed 26 March 2020

  15. kali.org. (2020) https://tools.kali.org/password-attacks/hydra. Accessed 26 March 2020

  16. kali.org. (2020) https://tools.kali.org/wireless-attacks/fern-wifi-cracker. Accessed 29 March 2020

  17. Alsmadi I (2019) Cyber threat analysis. In: The NICE cyber security framework. Springer, Cham. https://doi.org/10.1007/978–3-030-02360-7_9

    Google Scholar 

  18. Vasek M, Thornton M, Moore T (2014). Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. Lecture notes in computer science, pp 5771. https://doi.org/10.1007/978–3-662-44774-1_5

    Google Scholar 

  19. Alosaimi W, Zak M, Al-Begain K (2015) Denial of service attacks mitigation in the cloud. In: 2015 9th international conference on next generation mobile applications, Services and technologies. https://doi.org/10.1109/ngmast.2015.48

  20. Aircrack-ng.org (2020) Deauthentication [Aircrack-Ng]. https://www.aircrack-ng.org/doku.php?id=deauthentication. Accessed 29 March 2020

  21. Bcs.org. (2020) https://www.bcs.org/content-hub/ethics-of-penetration-testing/. Accessed 2 April 2020

  22. Kalitut.com. (2020) Routersploit tutorial. https://www.kalitut.com/2019/05/routersploit.html. Accessed 29 April 2020

  23. Chandel R (2020) Comprehensive guide on hydra - a brute forcing tool. [online] Hacking articles. https://www.hackingarticles.in/comprehensive-guide-on-hydra-a-brute-forcing-tool/. Accessed 29 April 2020

  24. Wired T (2020) The 5 essentials of ddos mitigation. [online] WIRED. https://www.wired.com/insights/2012/12/the-5-essentials-of-ddos-mitigation/. Accessed 12 March 2020

  25. Yacchirena A, Alulema D, Aguilar D, Morocho D, Encalada F, Granizo E (2016) Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. In: 2016 IEEE international conference on automatica (ICA-ACCA). https://doi.org/10.1109/ica-acca.2016.7778423

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Victor Chang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Golightly, L., Chang, V., Xu, Q.A. (2021). Towards Ethical Hacking—The Performance of Hacking a Router. In: Jahankhani, H., Kendzierskyj, S., Akhgar, B. (eds) Information Security Technologies for Controlling Pandemics. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-72120-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-72120-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-72119-0

  • Online ISBN: 978-3-030-72120-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics