Home // SECURWARE 2016, The Tenth International Conference on Emerging Security Information, Systems and Technologies // View article
Using Ethical Hacking to Analyze BYOD Safety in Corporations
Authors:
Roman Jašek
Jakub Nožička
Keywords: hacking; tablet; android; Kali Linux; wireless network.
Abstract:
Tablets and smart phones using the Android platform are still more popular for the general population than devices using operating system Microsoft Windows or iOS. This fact is useful for hackers. For hackers, it is important to always carry with them tools to scan the network traffic in a manner that is not obvious to others. It may be difficult, and sometimes impossible, to connect to a network that the hacker wants to attach using metallic cable. Hackers are less striking in scanning network traffic on the wireless network and even less striking in scanning when using tablets. For this purpose, is perfect to use tablet with Kali Linux (Android platform). Such a tablet can be modified to be used for attacks on corporate wireless network and potential hacker becomes even less striking. Kali Linux distribution does not have high hardware department, therefore can be used at tablets with basic hardware equipment.
Pages: 157 to 161
Copyright: Copyright (c) IARIA, 2016
Publication date: July 24, 2016
Published in: conference
ISSN: 2162-2116
ISBN: 978-1-61208-493-0
Location: Nice, France
Dates: from July 24, 2016 to July 28, 2016