Abstract
The increase and advancements of network technology play a significant role in the lives of us. This is through homes, businesses and people in a professional and social capacity. The way we use technology in everyday life aids the friendships, achievements and entertainment parts of our day to day life. This makes the fundamental device in the network important to every one of us for conducting our day to day life–that device is the router. Much like a fridge or cooker would have in the 1950 s, the router is considered as a critical device in the home and business setting. This paper aims to demonstrate a penetration test documentation of a standard home or small business Router–TP-Link WR940N by using the operating system Kali Linux 2019/2020. The main aim of the paper is to show the extent of what someone can do and the lengths someone can go from essentially sitting outside your house in a car with a raspberry pi, a Wi-Fi adapter, a seven-inch screen, and a travel battery for power.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shebli HMZA, Beheshti BD (2018) A study on penetration testing process and tools. In: 2018 IEEE long island systems, applications and technology conference (LISAT), Farmingdale, NY, 2018, pp 1-7. https://doi.org/10.1109/LISAT.2018.8378035
Trabelsi Z, Ibrahim W (2013) Teaching ethical hacking in information security curriculum: a case study. In: 2013 IEEE global engineering education conference (EDUCON). https://doi.org/10.1109/educon.2013.6530097
Maraj A, Jakupi G, Rogova E, Grajqevci X (2017) Testing of network security systems through DoS attacks. In: 2017 6th mediterranean conference on embedded computing (MECO). https://doi.org/10.1109/meco.2017.7977239
Visoottiviseth V, Akarasiriwong P, Chaiyasart S, Chotivatunyu S (2017) PENTOS: penetration testing tool for internet of thing devices. In: TENCON 2017–2017 IEEE region 10 conference. https://doi.org/10.1109/tencon.2017.8228241
Devi RS, Kumar MM (2020) Testing for security weakness of web applications using ethical hacking. In: 2020 4th international conference on trends in electronics and informatics (ICOEI)(48184). https://doi.org/10.1109/icoei48184.2020.9143018
Xuan S, Wang H, Gao D, Chung I, Wang W, Yang W (2019) Network penetration identification method based on interactive behavior analysis. In: 2019 seventh international conference on advanced cloud and big data (CBD). https://doi.org/10.1109/cbd.2019.00046
Cardwell K (2014) Building virtual pentesting labs for advanced penetration testing. Packt Publishing Ltd
Denis M, Zena C, Hayajneh T (2016) Penetration testing: concepts, attack methods, and defense strategies. In: 2016 IEEE long island systems, applications and technology conference (LISAT). IEEE, pp 1–6
Epling L, Hinkel B, Hu Y (2015) Penetration testing in a box. In: Proceedings of the 2015 information security curriculum development conference, pp 1–4
Singhal TC (2009) Method and apparatus for network security using a router based authentication system. U.S. Patent 7,519,986
Wang Y, Jin Z, Zhao X (2010) Practical defense against wep and wpa-psk attack for wlan. In: 2010 6th international conference on wireless communications networking and mobile computing (WiCOM). IEEE, pp 1–4
Tools.kali.org. (2020) https://tools.kali.org/wireless-attacks/wifite. Accessed 26 March 2020
By :KaliTools (2020) Airgeddon - Penetration Testing Tools. [online] En.kali.tools. https://en.kali.tools/?p=249. Accessed 26 March 2020
kali.org. (2020) https://tools.kali.org/exploitation-tools/routersploit. Accessed 26 March 2020
kali.org. (2020) https://tools.kali.org/password-attacks/hydra. Accessed 26 March 2020
kali.org. (2020) https://tools.kali.org/wireless-attacks/fern-wifi-cracker. Accessed 29 March 2020
Alsmadi I (2019) Cyber threat analysis. In: The NICE cyber security framework. Springer, Cham. https://doi.org/10.1007/978–3-030-02360-7_9
Vasek M, Thornton M, Moore T (2014). Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. Lecture notes in computer science, pp 5771. https://doi.org/10.1007/978–3-662-44774-1_5
Alosaimi W, Zak M, Al-Begain K (2015) Denial of service attacks mitigation in the cloud. In: 2015 9th international conference on next generation mobile applications, Services and technologies. https://doi.org/10.1109/ngmast.2015.48
Aircrack-ng.org (2020) Deauthentication [Aircrack-Ng]. https://www.aircrack-ng.org/doku.php?id=deauthentication. Accessed 29 March 2020
Bcs.org. (2020) https://www.bcs.org/content-hub/ethics-of-penetration-testing/. Accessed 2 April 2020
Kalitut.com. (2020) Routersploit tutorial. https://www.kalitut.com/2019/05/routersploit.html. Accessed 29 April 2020
Chandel R (2020) Comprehensive guide on hydra - a brute forcing tool. [online] Hacking articles. https://www.hackingarticles.in/comprehensive-guide-on-hydra-a-brute-forcing-tool/. Accessed 29 April 2020
Wired T (2020) The 5 essentials of ddos mitigation. [online] WIRED. https://www.wired.com/insights/2012/12/the-5-essentials-of-ddos-mitigation/. Accessed 12 March 2020
Yacchirena A, Alulema D, Aguilar D, Morocho D, Encalada F, Granizo E (2016) Analysis of attack and protection systems in Wi-Fi wireless networks under the Linux operating system. In: 2016 IEEE international conference on automatica (ICA-ACCA). https://doi.org/10.1109/ica-acca.2016.7778423
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Golightly, L., Chang, V., Xu, Q.A. (2021). Towards Ethical Hacking—The Performance of Hacking a Router. In: Jahankhani, H., Kendzierskyj, S., Akhgar, B. (eds) Information Security Technologies for Controlling Pandemics. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-72120-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-030-72120-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72119-0
Online ISBN: 978-3-030-72120-6
eBook Packages: Computer ScienceComputer Science (R0)