Home // SECURWARE 2016, The Tenth International Conference on Emerging Security Information, Systems and Technologies // View article


Using Ethical Hacking to Analyze BYOD Safety in Corporations

Authors:
Roman Jašek
Jakub Nožička

Keywords: hacking; tablet; android; Kali Linux; wireless network.

Abstract:
Tablets and smart phones using the Android platform are still more popular for the general population than devices using operating system Microsoft Windows or iOS. This fact is useful for hackers. For hackers, it is important to always carry with them tools to scan the network traffic in a manner that is not obvious to others. It may be difficult, and sometimes impossible, to connect to a network that the hacker wants to attach using metallic cable. Hackers are less striking in scanning network traffic on the wireless network and even less striking in scanning when using tablets. For this purpose, is perfect to use tablet with Kali Linux (Android platform). Such a tablet can be modified to be used for attacks on corporate wireless network and potential hacker becomes even less striking. Kali Linux distribution does not have high hardware department, therefore can be used at tablets with basic hardware equipment.

Pages: 157 to 161

Copyright: Copyright (c) IARIA, 2016

Publication date: July 24, 2016

Published in: conference

ISSN: 2162-2116

ISBN: 978-1-61208-493-0

Location: Nice, France

Dates: from July 24, 2016 to July 28, 2016