Penetration Testing Pada Jaringan Wifi Menggunakan Kali Linux
Abstract
Full Text:
UntitledReferences
D. M. Sari et al., “Analisis Sistem Keamanan Jaringan Wireless (Wep, Wpapsk/Wpa2psk) Mac Address, Menggunakan Metode Penetration Testing”, semanTIK, vol.3, no.2, pp. 203-208, 2017.
M. A. Rahmadani et al., ”Implementasi Hacking Wireless dengan Kali Linux Menggunakan Kali Nethunter”, Eproc, vol.3, no.3, 2017
S. G. V. Vipin Poddar et al, “Comparitive Analysis of Wireless Security Protocols (WEP and WPA2),” Int. J. Ad Hoc Netw. Syst., vol. 4, no. 3, pp. 1–7, 2014
P. D. V. R. G. Vibhawari and V. Nanavare, “A Survey on Evil Twin Access Point Detection Technique,” Int. J. Innov. Res. Comput. Commun. Eng., 2016.
C. Modi, V. Parekh, “Detection of Rogue Access Point to Prevent Evil Twin Attack in Wireless Network,” Int. J. Eng. Res. Technol., vol. 6, no. 4, pp. 23–27, 2014
M. G. H. Wibowo et al.,” Keamanan Jaringan Wlan Terhadap Serangan Wireless Hacking Pada Dinas Komunikasi & Informatika DIY” pada Prosiding sensei, 2017
Refbacks
- There are currently no refbacks.