Wireless Networks Security Flaws and Hacking Avenues of Attacks
DOI:
https://doi.org/10.56286/dyzcgj07Keywords:
MITM, ARP Spoofing, SSL Stripping, DNS Spoofing, DoS, BettercapAbstract
An access point offers wireless networking to several wireless client nodes in the shared medium when using IEEE 802.11 wireless local area networks in infrastructure mode. The related nodes could be at risk of security attacks. In the field of cybersecurity, it is not sufficient to identify vulnerable points; rather, the difficulty lies in learning how hackers can take advantage of weak points to take countermeasures. This research paper simulates some of the risks caused by an attacker when connecting to an AP, as well as the risks of connecting to open Internet networks in public places, the importance of not using them to transfer personal data, and the need to raise awareness of the importance of protecting wireless networks. The Bettercap tool from the Kali Lunix operating system was used to simulate Address Resolution Protoco (ARP) spoofing attack, Secure Sockets Layer (SSL) Stripping attack, Domain Name System (DNS) spoofing attack, and Denial of Service (DoS) attack, which are based on Man in the Middle (MITM) attacks.
Additional Files
Published
Issue
Section
License
Copyright (c) 2025 Asmaa Akram Ghanim, Mohammed Younis Thanoun

This work is licensed under a Creative Commons Attribution 4.0 International License.






