Bibliography
Bibliography
Bibliography
[1] Nazir, R., Laghari, A. A., Kumar, K., David, S., & Ali, M. (2021). Survey on Wire-
less Network Security. Archives of Computational Methods in Engineering,
29(3), 1591–1610. https://doi.org/10.1007/s11831-021-09631-5
[2] Richard, A. (2012b, November 22). GRIN - Evaluation of WLAN Security and Per-
formance. Retrieved December 12, 2022, from https://www.grin.com/document/
205389?
fbclid=IwAR0YUGQTBJlI3AhAX1iuPMTc7lSE1_C_9yzR_wq4jlF5cvuX2VJ3s
g4de-w
[3] Brooks, C. J., Grow, C., Craig, P. A., Jr, & Short, D. (2018). Cybersecurity Essentials.
John Wiley & Sons.
[4] Fikriyadi, F. (2020, November 1). Jurnal Mantik | Jurnal Mantik. Retrieved Decem-
ber 13, 2022, from http://iocscience.org/ejournal/index.php/mantik/article/view/
974
[5] Techopedia. (2020, May 12). What is Authentication? - Definition from Techopedia.
https://www.techopedia.com/definition/342/authentication
[7] Latto, N. (2023). Exploits: What You Need to Know. Exploits: What You Need to
Know. https://www.avast.com/c-exploits
[8] IEEE SA. (2023, May 10). About Us - IEEE Standards Association. IEEE Standards
Association. https://standards.ieee.org/about/
107
BIBLIOGRAPHY
[11] Mel H. (September 30, 2020). What Is Mac Address Filtering? Retrieved December
16, 2022, from https://www.technipages.com/what-is-mac-address-filtering
[12] Yasar, K., & Gillis, A. S. (2023). computer network. Networking. https://
www.techtarget.com/searchnetworking/definition/network
[13] Choosing and Protecting Passwords | CISA. (2019, November 18). Cybersecurity
and Infrastructure Security Agency CISA. https://www.cisa.gov/news-events/
news/choosing-and-protecting-passwords
[14] Anand, K. (2023, March 14). What is Penetration Testing | Step-By-Step Process &
Methods | Imperva. Learning Center. https://www.imperva.com/learn/application-
security/penetration-testing/
[15] Thakur, A., & Thakur, A. (2023). Vulnerability in Cyber Security. Intellipaat Blog.
https://intellipaat.com/blog/vulnerability-in-cyber-security/?US
[16] Cisco. (2022b, April 9). (What Is a Wireless LAN (WLAN)? Retrieved December 17,
2022, from https://www.cisco.com/c/en/us/products/wireless/wireless-lan.html
[17] Ghimiray, D. (2022, August 22). What is WPA2 (wireless protected access 2)? Re-
trieved December 19, 2022, from https://www.avg.com/en/signal/what-is-wpa2
[18] Contributor, T. (2019, January 31). WPA3. Security. Retrieved December 18, 2022,
from https://www.techtarget.com/searchsecurity/definition/WPA3
[19] Harvey, S. (2019, August 28). What is Wireless Penetration Testing? – Wireless
Security | KirkpatrickPrice. KirkpatrickPrice Home. Retrieved January 10, 2023,
from https://kirkpatrickprice.com/blog/what-is-wireless-penetration-testing/
[20] Mehta, P. (2021, May). What is pen testing? SearchSecurity. Retrieved January 10,
2023, from https://www.techtarget.com/searchsecurity/definition/penetration-testing
108
BIBLIOGRAPHY
[22] Robb, D. (2020, December 29). WiFi Testing Tools | Free Wireless Security Tools
for
2022. ESecurityPlanet. Retrieved January 10, 2023, from https://www.esecurity-
planet.com/mobile/wifi-security-testing-tools/
[23] Hautzinger, D. (2021). The Wifi Pineapple - The Forbidden Fruit of Networking.
Summer Interdisciplinary Research Symposium. Retrieved December 12, 2022,
from https://scholar.valpo.edu/sires/102/
[25] NI Cyber Guy. (2021, August 21). What is a Pineapple wifi? - NI Cyber Guy.
Retrieved December 12, 2022 from, https://nicyberguy.com/what-is-a-pineapple-
wifi/
[26] Hak5. (2019). WiFi Pineapple. Hak5. Retrieved December 12, 2022 from,
https://shop.hak5.org/products/wifi-pineapple
[27] Lucideus. (2018, October 27). Turn your Raspberry Pi Device to an Ultimate
Pentesting Machine | Lucideus Research. Medium. Retrieved December 15, 2022
from, https://medium.com/@lucideus/turn-your-raspberry-pi-device-to-an-ulti-
mate-pentesting-machine-lucideus-research-261739d11cc
[28] N, Balaji. (2020, August 16). Wireless Penetration Testing Approach: Kali Linux
and
Raspberry Pi for Security Analytics. Kali Linux Tutorials. Retrieved December
15, 2022, https://kalilinuxtutorials.com/wireless-penetration-testing-approach-
kali-linux-and-raspberry-pi-for-security-analytics/
[29] Pantech ELearning. (2021, July 8). What are advantages and disadvantages of
Raspberry Pi? Retrieved December 16, 2022 from,
https://www.pantechelearning.com/advantages-disadvantages-of-raspberry-pi/
[30] MACFOS. (2020, May 6). Pros and Cons of Raspberry Pi: Detailed Guide in 2020.
109
BIBLIOGRAPHY
[31] aid. (2019, April 18). Using Kali Linux for Penetration Testing. Apriorit. Re-
trieved December 22, 2022 from,
https://www.apriorit.com/qa-blog/611-kali-linux-for-pentesting
[32] Williams, L. (2019, June 6). Kali Linux Tutorial: What is, Install, Utilize Metasploit
and Nmap. Guru99.com. Retrieved December 22, 2022 from, https://
www.guru99.com/kali-linux-tutorial.html
[33] Khanna, P. (2022, May 27). 13 Positives and Negatives of Kali Linux. Tech Quintal.
Retrieved December 23, 2022 from, https://www.techquintal.com/advantages-
and-disadvantages-of-kali-linux/
[34] KaliTut. (2019, April 6). Best Kali Linux WIFI Adapter with Monitor Mode June
2021. Retrieved December 23, 2022 from, https://kalitut.com/usb-wi-fi-adapters-
supporting-monitor/
[36] Chahal, F. (2018, March 1). Reasons Why and Why Not to Use A WiFi USB
Adapter?
Www.linkedin.com. Retrieved December 26, 2022 from, https://www.linkedin.-
com/pulse/reasons-why-use-wifi-usb-adapter-fateh-chahal/
[37] By. (2021, May 27). WiFi Penetration Testing With An ESP32. Hackaday. Re-
trieved December 26, 2022 from,
https://hackaday.com/2021/05/27/wifi-penetration-testing-with-an-esp32/
[38] son. (2021, September 11). ESP32 Wi-Fi Penetration Tool • Penetration Testing.
Penetration Testing. Retrieved December 26, 2022 from, https://securityon-
line.info/esp32-wi-fi-penetration-tool/
[39] Expert, R. P. (2021, May 28). WIFI PENETRATION TESTING WITH AN ESP32.
110
BIBLIOGRAPHY
[40] Fedorov, Y. (2022, May 4). How to choose a microcontroller for your task: the pros
and cons of various MCUs. 2Smart. Retrieved December 27, 2022 from, https://
2smart.com/docs-resources/articles/how-to-choose-a-microcontroller-for-your-
task-the-pros-and-cons-of-various mcus#:~:text=Disadvantages%20of
%20ESP32%3A
[42] Tatianna. (2018, December 4). LAN Turtles and Hardware-Based Network
Reconnaissance. Cybrary. Retrieved January 10, 2023 from,https://www.cy-
brary.it/blog/2018/12/lan-turtles-hardware-based-network-reconnaissance/
[43] Www.sony-Latin.com. (2022, May 26). What Is Wireless Encryption and Why Is
It Used? | Sony Latin America. Retrieved December 28, 2022 from,https://www.-
sony-latin.com/en/electronics/support/reader-digital-book-prs-series/articles/
00009475
[44] GeeksforGeeks . (2022, June 22). Types of Wireless Security Encryption. (2022,
June 22). Retrieved December 29, 2022 from, https://www.geeksforgeeks.org/
types-of-wireless-security-encryption/
[45] Atria Convergence Technologies Ltd. (2021, January 11). WEP, WPA, or WPA2:
What Security Type Does Your Wi-Fi Need? Retrieved December 29, 2022 from,
Www.actcorp.in. https://www.actcorp.in/blog/wep-wpa-wpa2-wifi-security
[46] Ghimiray, D. (2022, January 7). Wi-Fi Security: WEP vs WPA or WPA2. Wi-Fi
Security: WEP vs WPA or WPA2. Retrieved January 3, 2023 from, https://
www.avast.com/c-wep-vs-wpa-or-wpa2
[47] BasuMallick, C. (2022, October 19). What Is WPA (Wi-Fi Protected Access)?
111
BIBLIOGRAPHY
[48] Kuhn, M. G., Mulligan, D. K., & Whyte, W. A. (2018). Guide to enterprise wireless
LAN security. National Institute of Standards and Technology. Retrieved by June
14, 2023 from, https://doi.org/10.6028/NIST.SP.800-153.
[49] Salter, J. (2019, March 10). A brief history of Wi-Fi security protocols from “oh my,
that’s bad” to WPA3. Ars Technica; Ars Technica.
[50] Hoelscher, P. (2018, August 27). What is WPA3? Is WPA3 secure and should
i use it? Comparitech. Retrieved January 4, 2023 from, https://www.compar-
itech.com/blog/information-security/what-is-wpa3/
[51] Shaw, K. (2020, April 23). 802.11x: Wi-Fi standards and speeds explained. Network
World. Retrieved January 5, 2023 from, https://www.networkworld.com/article/
3238664/80211x-wi-fi-standards-and-speeds-explained.html
[52] Chavez, N. (2020, April 2). Wi-Fi 6 - What Is It? Diligex Managed IT Services and
Support. Retrieved January 5, 2023 from, https://diligex.com/2020/04/wi-fi-6-
what-is-it/
[53] Alsahlany, Ali & Alfatlawy, Zainalabdin & Almusawy, Alhassan. (2019).
Experimental Evaluation of Different Penetration Security Levels in Wireless Lo-
cal Area Network. Journal of Communications. 13. Retrieved December 6, 2022
from, 10.12720/jcm.13.12.723-729.
[54] Lindroos, S., Hakkala, A., & Virtanen, S. (2021). A systematic methodology for
continuous WLAN abundance and security analysis. Computer Networks, 197,
108359. Retrieved December 6, 2022 from, https://doi.org/10.1016/
j.comnet.2021.108359
[55] Fikriyadi, F., Ritzkal, R., & Prakosa, B. A. (2020). Security Analysis of Wireless
Local Area Network (WLAN) Network with the Penetration Testing Method. Ju-
rnal Mantik, 4(3), 1658–1662. Retrieved December 7, 2022 from, https://
doi.org/10.35335/mantik.Vol4.2020.974.pp1658-1662
112
BIBLIOGRAPHY
[56] Sudhakar, G., & Babu, P. R. (2018). Penetration testing and security analysis of
wireless networks: A survey. Journal of Network and Computer Applications,
116, 62-76. Retrieved by June 14, 2023 from,
https://doi.org/10.1016/j.jnca.2018.06.009
[57] Jayasuryapal, G & Pranay, P. & Kaur, Harpreet & Swati,. (2021). A Survey on
Network Penetration Testing. Retrieved December 9, 2022 from, 373-378.
10.1109/ICIEM51511.2021.9445321.
113