WLAN Penetration Examination of The University of Pembangunan Panca Budi
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2016 by IJETT Journal|
|Year of Publication : 2016|
|Authors : Akhyar Lubis1 , Andysah Putera Utama Siahaan
|DOI : 10.14445/22315381/IJETT-V37P227|
Akhyar Lubis, Andysah Putera Utama Siahaan"WLAN Penetration Examination of The University of Pembangunan Panca Budi", International Journal of Engineering Trends and Technology (IJETT), V37(3),165-168 July 2016. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Hacking and cracking passwords on Wi- Fi in campus location is criminal acts that might approach because it could be considered stealing. Many Wi-Fi SSID are protected. It means that the owner of the Wi-Fi does not allow connections used freely by strangers. The are Many ways to crack it. A penetration test is one of the popular techniques to break the password. This tool directs the user to try to connect to the similar SSID name. However, they do not realize the name they join in is a fake SSID. This moment is used by the attackers to obtain the password. Soon after they try to connect several times, the attacker has been already recorded the SSID password.
 R. W. Beggs, Mastering Kali Linux for Advanced Penetration Testing, Birmingham: Packt Publishing, 2014.
 A. Gupta, Kavita dan K. Kaur, “Vulnerability Assessment and Penetration Testing,” International Journal of Engineering Trends and Technology, vol. 4, no. 3, pp. 328-333, 2013.
 A. G. Bacudio, 1. Yuan, B.-T. B. Chu dan M. Jones, “An Overview of Penetration Testing,” International Journal of Network Security & Its Applications (IJNSA), vol. 3, no. 6, pp. 19-38, 2011.
 K. Xynos, I. Sutherland, H. Read, E. Everitt dan A. J. Blyth, “Penetration Testing And Vulnerability Assessments: A Professional Approach,” dalam International Cyber Resilience conference, Perth, 2010.
 B.-H. Kang, “About Effective Penetration Testing Methodology,” Journal of Security Engineering, vol. 5, no. 5, pp. 425-432, 2008.
 A. P. U. Siahaan, “The Weakness of Wireless Networks,” inSEMILOKA, Medan, 2011.
Security, Penetration Test, Hacking, Wi-Fi.