0% found this document useful (0 votes)
58 views7 pages

Bibliography

[1] The document is a bibliography containing 47 sources related to wireless network security and penetration testing. [2] The sources cover topics like wireless encryption standards (WEP, WPA, WPA2), wireless penetration tools (Kali Linux, WiFi Pineapple, ESP32), and wireless attacks (wireless reconnaissance, packet injection). [3] The bibliography provides references for further research on assessing and improving security of wireless networks.

Uploaded by

ryyy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views7 pages

Bibliography

[1] The document is a bibliography containing 47 sources related to wireless network security and penetration testing. [2] The sources cover topics like wireless encryption standards (WEP, WPA, WPA2), wireless penetration tools (Kali Linux, WiFi Pineapple, ESP32), and wireless attacks (wireless reconnaissance, packet injection). [3] The bibliography provides references for further research on assessing and improving security of wireless networks.

Uploaded by

ryyy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

BIBLIOGRAPHY

Bibliography

[1] Nazir, R., Laghari, A. A., Kumar, K., David, S., & Ali, M. (2021). Survey on Wire-
less Network Security. Archives of Computational Methods in Engineering,
29(3), 1591–1610. https://doi.org/10.1007/s11831-021-09631-5

[2] Richard, A. (2012b, November 22). GRIN - Evaluation of WLAN Security and Per-
formance. Retrieved December 12, 2022, from https://www.grin.com/document/
205389?
fbclid=IwAR0YUGQTBJlI3AhAX1iuPMTc7lSE1_C_9yzR_wq4jlF5cvuX2VJ3s
g4de-w

[3] Brooks, C. J., Grow, C., Craig, P. A., Jr, & Short, D. (2018). Cybersecurity Essentials.
John Wiley & Sons.

[4] Fikriyadi, F. (2020, November 1). Jurnal Mantik | Jurnal Mantik. Retrieved Decem-
ber 13, 2022, from http://iocscience.org/ejournal/index.php/mantik/article/view/
974

‌[5] Techopedia. (2020, May 12). What is Authentication? - Definition from Techopedia.
https://www.techopedia.com/definition/342/authentication

[6] Loshin, P., & Cobb, M. (2022). encryption. Security. https://www.techtarget.com/


searchsecurity/definition/encryption

[7] Latto, N. (2023). Exploits: What You Need to Know. Exploits: What You Need to
Know. https://www.avast.com/c-exploits

[8] IEEE SA. (2023, May 10). About Us - IEEE Standards Association. IEEE Standards
Association. https://standards.ieee.org/about/

[9] https:\/\/round-lake.dustinice.workers.dev:443\/https\/www.wpbeginner.com\/author\/keri\/#author. (2021b, August 25). What Is an


IP Address? (Definition + Explanation for Beginners). WPBeginner. Retrieved
December 15, 2022, from https://www.wpbeginner.com/glossary/ip-address/

[10] Techopedia. (2019). What is IT Infrastructure? - Definition from Techopedia.


Techopedia.com. Retrieved December 15, 2022, from https://www.techopedia.-
com/definition/29199/it-infrastructure

107
BIBLIOGRAPHY

[11] Mel H. (September 30, 2020). What Is Mac Address Filtering? Retrieved December
16, 2022, from https://www.technipages.com/what-is-mac-address-filtering

[12] Yasar, K., & Gillis, A. S. (2023). computer network. Networking. https://
www.techtarget.com/searchnetworking/definition/network

‌[13] Choosing and Protecting Passwords | CISA. (2019, November 18). Cybersecurity
and Infrastructure Security Agency CISA. https://www.cisa.gov/news-events/
news/choosing-and-protecting-passwords

[14] Anand, K. (2023, March 14). What is Penetration Testing | Step-By-Step Process &
Methods | Imperva. Learning Center. https://www.imperva.com/learn/application-
security/penetration-testing/

[15] Thakur, A., & Thakur, A. (2023). Vulnerability in Cyber Security. Intellipaat Blog.
https://intellipaat.com/blog/vulnerability-in-cyber-security/?US

[16] Cisco. (2022b, April 9). (What Is a Wireless LAN (WLAN)? Retrieved December 17,
2022, from https://www.cisco.com/c/en/us/products/wireless/wireless-lan.html

[17] Ghimiray, D. (2022, August 22). What is WPA2 (wireless protected access 2)? Re-
trieved December 19, 2022, from https://www.avg.com/en/signal/what-is-wpa2

[18] Contributor, T. (2019, January 31). WPA3. Security. Retrieved December 18, 2022,
from https://www.techtarget.com/searchsecurity/definition/WPA3

[19] Harvey, S. (2019, August 28). What is Wireless Penetration Testing? – Wireless
Security | KirkpatrickPrice. KirkpatrickPrice Home. Retrieved January 10, 2023,
from https://kirkpatrickprice.com/blog/what-is-wireless-penetration-testing/

[20] Mehta, P. (2021, May). What is pen testing? SearchSecurity. Retrieved January 10,
2023, from https://www.techtarget.com/searchsecurity/definition/penetration-testing

[21] Beaver, K. M. (2018). Hacking. John Wiley & Sons, Inc.

108
BIBLIOGRAPHY

[22] Robb, D. (2020, December 29). WiFi Testing Tools | Free Wireless Security Tools
for
2022. ESecurityPlanet. Retrieved January 10, 2023, from https://www.esecurity-
planet.com/mobile/wifi-security-testing-tools/

[23] Hautzinger, D. (2021). The Wifi Pineapple - The Forbidden Fruit of Networking.
Summer Interdisciplinary Research Symposium. Retrieved December 12, 2022,
from https://scholar.valpo.edu/sires/102/

[24] Lutkevich, B. (2022, October 14). What is a Wi-Fi Pineapple? SearchSecurity.


Retrieved December 12, 2022 from, https://www.techtarget.com/searchsecurity/
definition/Wi-Fi-Pineapple

[25] NI Cyber Guy. (2021, August 21). What is a Pineapple wifi? - NI Cyber Guy.
Retrieved December 12, 2022 from, https://nicyberguy.com/what-is-a-pineapple-
wifi/

[26] Hak5. (2019). WiFi Pineapple. Hak5. Retrieved December 12, 2022 from,
https://shop.hak5.org/products/wifi-pineapple

[27] Lucideus. (2018, October 27). Turn your Raspberry Pi Device to an Ultimate
Pentesting Machine | Lucideus Research. Medium. Retrieved December 15, 2022
from, https://medium.com/@lucideus/turn-your-raspberry-pi-device-to-an-ulti-
mate-pentesting-machine-lucideus-research-261739d11cc

[28] N, Balaji. (2020, August 16). Wireless Penetration Testing Approach: Kali Linux
and
Raspberry Pi for Security Analytics. Kali Linux Tutorials. Retrieved December
15, 2022, https://kalilinuxtutorials.com/wireless-penetration-testing-approach-
kali-linux-and-raspberry-pi-for-security-analytics/

[29] Pantech ELearning. (2021, July 8). What are advantages and disadvantages of
Raspberry Pi? Retrieved December 16, 2022 from,
https://www.pantechelearning.com/advantages-disadvantages-of-raspberry-pi/

[30] MACFOS. (2020, May 6). Pros and Cons of Raspberry Pi: Detailed Guide in 2020.

109
BIBLIOGRAPHY

Robu.in | Indian Online Store | RC Hobby | Robotics. Retrieved December 16,


2022 from,https://robu.in/5-pros-and-5-cons-of-raspberry-pi/

[31] aid. (2019, April 18). Using Kali Linux for Penetration Testing. Apriorit. Re-
trieved December 22, 2022 from,
https://www.apriorit.com/qa-blog/611-kali-linux-for-pentesting

[32] Williams, L. (2019, June 6). Kali Linux Tutorial: What is, Install, Utilize Metasploit
and Nmap. Guru99.com. Retrieved December 22, 2022 from, https://
www.guru99.com/kali-linux-tutorial.html

[33] Khanna, P. (2022, May 27). 13 Positives and Negatives of Kali Linux. Tech Quintal.
Retrieved December 23, 2022 from, https://www.techquintal.com/advantages-
and-disadvantages-of-kali-linux/

[34] KaliTut. (2019, April 6). Best Kali Linux WIFI Adapter with Monitor Mode June
2021. Retrieved December 23, 2022 from, https://kalitut.com/usb-wi-fi-adapters-
supporting-monitor/

[35] CYBERPUNK. (2018, November 27). Alfa AWUS036NHA USB Wireless


Adapter. Retrieved December 23, 2022 from,
https://www.cyberpunk.rs/alfa-awus036nha-usb-wireless-adapter

[36] Chahal, F. (2018, March 1). Reasons Why and Why Not to Use A WiFi USB
Adapter?
Www.linkedin.com. Retrieved December 26, 2022 from, https://www.linkedin.-
com/pulse/reasons-why-use-wifi-usb-adapter-fateh-chahal/

[37] By. (2021, May 27). WiFi Penetration Testing With An ESP32. Hackaday. Re-
trieved December 26, 2022 from,
https://hackaday.com/2021/05/27/wifi-penetration-testing-with-an-esp32/

[38] son. (2021, September 11). ESP32 Wi-Fi Penetration Tool • Penetration Testing.
Penetration Testing. Retrieved December 26, 2022 from, https://securityon-
line.info/esp32-wi-fi-penetration-tool/

[39] Expert, R. P. (2021, May 28). WIFI PENETRATION TESTING WITH AN ESP32.

110
BIBLIOGRAPHY

Raspberry PI Projects. Retrieved December 27, 2022 from, https://projects-rasp-


berry.com/wifi-penetration-testing-with-an-esp32/

[40] Fedorov, Y. (2022, May 4). How to choose a microcontroller for your task: the pros
and cons of various MCUs. 2Smart. Retrieved December 27, 2022 from, https://
2smart.com/docs-resources/articles/how-to-choose-a-microcontroller-for-your-
task-the-pros-and-cons-of-various mcus#:~:text=Disadvantages%20of
%20ESP32%3A

[41] CYBERPUNK. (2019, January 12).LAN Turtle [DROP SHELLS ANYWHERE].


Retrieved January 10, 2023 from,
https://www.cyberpunk.rs/lan-turtle-drop-shells-anywhere

[42] Tatianna. (2018, December 4). LAN Turtles and Hardware-Based Network
Reconnaissance. Cybrary. Retrieved January 10, 2023 from,https://www.cy-
brary.it/blog/2018/12/lan-turtles-hardware-based-network-reconnaissance/

[43] Www.sony-Latin.com. (2022, May 26). What Is Wireless Encryption and Why Is
It Used? | Sony Latin America. Retrieved December 28, 2022 from,https://www.-
sony-latin.com/en/electronics/support/reader-digital-book-prs-series/articles/
00009475

[44] GeeksforGeeks . (2022, June 22). Types of Wireless Security Encryption. (2022,
June 22). Retrieved December 29, 2022 from, https://www.geeksforgeeks.org/
types-of-wireless-security-encryption/

[45] Atria Convergence Technologies Ltd. (2021, January 11). WEP, WPA, or WPA2:
What Security Type Does Your Wi-Fi Need? Retrieved December 29, 2022 from,
Www.actcorp.in. https://www.actcorp.in/blog/wep-wpa-wpa2-wifi-security

[46] Ghimiray, D. (2022, January 7). Wi-Fi Security: WEP vs WPA or WPA2. Wi-Fi
Security: WEP vs WPA or WPA2. Retrieved January 3, 2023 from, https://
www.avast.com/c-wep-vs-wpa-or-wpa2

[47] BasuMallick, C. (2022, October 19). What Is WPA (Wi-Fi Protected Access)?

111
BIBLIOGRAPHY

Features, Versions, and Importance. Spiceworks. Retrieved January 3, 2023


from, 2022 from, https://www.spiceworks.com/tech/networking/articles/wpa-wifi-
protected-access/

[48] Kuhn, M. G., Mulligan, D. K., & Whyte, W. A. (2018). Guide to enterprise wireless
LAN security. National Institute of Standards and Technology. Retrieved by June
14, 2023 from, https://doi.org/10.6028/NIST.SP.800-153.

[49] Salter, J. (2019, March 10). A brief history of Wi-Fi security protocols from “oh my,
that’s bad” to WPA3. Ars Technica; Ars Technica.

[50] Hoelscher, P. (2018, August 27). What is WPA3? Is WPA3 secure and should
i use it? Comparitech. Retrieved January 4, 2023 from, https://www.compar-
itech.com/blog/information-security/what-is-wpa3/

[51] Shaw, K. (2020, April 23). 802.11x: Wi-Fi standards and speeds explained. Network
World. Retrieved January 5, 2023 from, https://www.networkworld.com/article/
3238664/80211x-wi-fi-standards-and-speeds-explained.html

[52] Chavez, N. (2020, April 2). Wi-Fi 6 - What Is It? Diligex Managed IT Services and
Support. Retrieved January 5, 2023 from, https://diligex.com/2020/04/wi-fi-6-
what-is-it/

[53] Alsahlany, Ali & Alfatlawy, Zainalabdin & Almusawy, Alhassan. (2019).
Experimental Evaluation of Different Penetration Security Levels in Wireless Lo-
cal Area Network. Journal of Communications. 13. Retrieved December 6, 2022
from, 10.12720/jcm.13.12.723-729.

[54] Lindroos, S., Hakkala, A., & Virtanen, S. (2021). A systematic methodology for
continuous WLAN abundance and security analysis. Computer Networks, 197,
108359. Retrieved December 6, 2022 from, https://doi.org/10.1016/
j.comnet.2021.108359

[55] Fikriyadi, F., Ritzkal, R., & Prakosa, B. A. (2020). Security Analysis of Wireless
Local Area Network (WLAN) Network with the Penetration Testing Method. Ju-
rnal Mantik, 4(3), 1658–1662. Retrieved December 7, 2022 from, https://
doi.org/10.35335/mantik.Vol4.2020.974.pp1658-1662

112
BIBLIOGRAPHY

[56] Sudhakar, G., & Babu, P. R. (2018). Penetration testing and security analysis of
wireless networks: A survey. Journal of Network and Computer Applications,
116, 62-76. Retrieved by June 14, 2023 from,
https://doi.org/10.1016/j.jnca.2018.06.009

[57] Jayasuryapal, G & Pranay, P. & Kaur, Harpreet & Swati,. (2021). A Survey on
Network Penetration Testing. Retrieved December 9, 2022 from, 373-378.
10.1109/ICIEM51511.2021.9445321.

[58] Mishra, Shailendra. (2021). Efficacy of Unconventional Penetration Testing Prac-


tices.
Intelligent Automation and Soft Computing. Retrieved December 10, 2022 from,
31. 223-239. 10.32604/iasc.2022.019485.

113

You might also like