Phishing on Open WLANs: Threat and Preventive Measure

dc.contributor.authorKhanna, Ishaen
dc.contributor.committeechairYang, Yalingen
dc.contributor.departmentElectrical and Computer Engineeringen
dc.date.accessioned2014-03-14T20:49:59Zen
dc.date.adate2010-01-10en
dc.date.available2014-03-14T20:49:59Zen
dc.date.issued2009-12-08en
dc.date.rdate2010-01-10en
dc.date.sdate2009-12-15en
dc.description.abstractPhishing is an internet security issue whose shape is still changing and size is still increasing. This thesis shows the possibility of a phishing attack on open, private Wireless LANs. Private WLANs which use a login page to authenticate users in hotels, airports and academic campuses are all vulnerable to this attack. Virginia Tech's WLAN is used as an example to show that the attack is possible. The attack combines two very well known attacks: one is to deceptively guide a user into logging into a fake website, which shows similar log-in page to the page of the website the user intends to go to, and the second attack is to show users a valid certificate, which does not show a warning. The rogue server takes the user to a log-in page which is similar to Virginia Tech's log-in page and shows him a valid security certificate. We present a solution to the proposed problem. Software is implemented that runs on Windows Vista. The software warns the user if there are servers with more than one type of security certificates, claiming to be from the same network. We contrast our method to already existing methods, and show in what respects our solution is better. The biggest advantage of this method is that it involves no change on the server side. It is not necessary for the users to have any prior knowledge of the network, which is very helpful when the users access WLAN at airports and hotels. Also, when using this method, the user does not need to connect to any network, and is still able to get a warning. It however, requires the user to be able to differentiate between the real and fake networks after the user has been warned.en
dc.description.degreeMaster of Scienceen
dc.identifier.otheretd-12152009-111233en
dc.identifier.sourceurlhttp://scholar.lib.vt.edu/theses/available/etd-12152009-111233/en
dc.identifier.urihttp://hdl.handle.net/10919/36170en
dc.publisherVirginia Techen
dc.relation.haspartKhanna_I_T_2009.pdfen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjectPhishingen
dc.subjectRogue APen
dc.subjectSSLen
dc.subjectCertificateen
dc.titlePhishing on Open WLANs: Threat and Preventive Measureen
dc.typeThesisen
thesis.degree.disciplineElectrical and Computer Engineeringen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Khanna_I_T_2009.pdf
Size:
727.73 KB
Format:
Adobe Portable Document Format

Collections