KEYWORDS: Global system for mobile communications, Standards development, Receivers, Environmental sensing, Antennas, Networks, Received signal strength, Telecommunications, RF communications, Data communications
Network environment challenges on identifying and direction finder of the emission sources can be performed in several different ways, depending on the spectral inter-frequency and of the equipment used. The tests performed that are still under development will show that there are many different scenarios that may lead to large difficulties in indoor locating of the radio equipment that are registered in standard mobile networks. Therefore, in this paper, we intend to test different receivers from different mobile communication standards with respect to the possibility of identifying and localization and to see the advantages and disadvantages of each generation of standards with respect to this issue.
In this paper we propose a practical approach on how an attacker, commonly named “Data interception” technology can sniff your data traffic when you browse the Internet over a Wireless Connection and use it in their favor in order to obtain a pattern of your preferences, steal your personal data and create your online profile, exploiting some of the most popular internet protocols, such as TCP/IP, HTTP, IMAP or other important protocols. Using a network adapter in active mode in Kali Linux, we managed to sniff the traffic sent and received through a target Access Point (AP), inspect the individual packets in WireShark and create a personal profile of the owner of each device connected, obtaining data about the online applications that they are using, such as WhatsApp, e-mail clients, or data about their identity.
The purpose of this paper is to validate the existence of vulnerabilities in computer networks - wireless networks which have in their architecture Windows operating systems. In order to demonstrate the vulnerabilities that still exist in windows 10 and windows 11 operating systems, the NetBIOS Name Service, Link Local Multicast Name Resolution, multicast DNS and WPAD protocols will be exploited. By exploiting these protocols, users' access credentials to the systems can be obtained. At the same time, we will propose a series of solutions that will reduce the chances of exploiting these protocols, to increase the security level of the network. Another role of this paper is to show that the use of Wi-Fi networks for the purpose of conveying confidential data is still unsafe. It also highlights the fact that improper use of the operating system Windows can lead to obtaining access data to an attacker who does not need powerful resources. The WPA2 protocol will be exploited to gain access to network resources, to subsequently formulate a series of conclusions aimed at inhibiting or completely reducing these security issues.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.