In this paper we propose a practical approach on how an attacker, commonly named “Data interception” technology can sniff your data traffic when you browse the Internet over a Wireless Connection and use it in their favor in order to obtain a pattern of your preferences, steal your personal data and create your online profile, exploiting some of the most popular internet protocols, such as TCP/IP, HTTP, IMAP or other important protocols. Using a network adapter in active mode in Kali Linux, we managed to sniff the traffic sent and received through a target Access Point (AP), inspect the individual packets in WireShark and create a personal profile of the owner of each device connected, obtaining data about the online applications that they are using, such as WhatsApp, e-mail clients, or data about their identity.
The purpose of this paper is to validate the existence of vulnerabilities in computer networks - wireless networks which have in their architecture Windows operating systems. In order to demonstrate the vulnerabilities that still exist in windows 10 and windows 11 operating systems, the NetBIOS Name Service, Link Local Multicast Name Resolution, multicast DNS and WPAD protocols will be exploited. By exploiting these protocols, users' access credentials to the systems can be obtained. At the same time, we will propose a series of solutions that will reduce the chances of exploiting these protocols, to increase the security level of the network. Another role of this paper is to show that the use of Wi-Fi networks for the purpose of conveying confidential data is still unsafe. It also highlights the fact that improper use of the operating system Windows can lead to obtaining access data to an attacker who does not need powerful resources. The WPA2 protocol will be exploited to gain access to network resources, to subsequently formulate a series of conclusions aimed at inhibiting or completely reducing these security issues.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.