skip to main content
10.1145/3483816.3483834acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmecgConference Proceedingsconference-collections
research-article

Penetration Test on Home Network Environments: A Cybersecurity Case Study

Published: 14 January 2022 Publication History

Abstract

Most of the people nowadays use internet connection in their home, especially nowadays that most of the companies are forced to adapt to a Work from Home Basis due to the pandemic (Covid 19) to continue their business activities. This study assesses how vulnerable the default setting of SOHO Routers that the public/private telecommunication companies provide to their consumer. Furthermore, the study assesses how limited/outdated the protection of the router that is provided. This study uses a Kali Linux, a Debian-Based Linux used for Digital Forensics and Penetration Testing to test the vulnerability of the routers to network attacks. Network Attacks such as Deauthentication, Dictionary and Bruteforcing Attack, ARP Poisoning, etc. are performed to help identify threats that could compromise the network of the user and provide secure practices and solutions to help mitigate those kinds of attack.

References

[1]
Rueda, Á. F., García, J. A. R., and de Castro, I. S,. Revisiting SOHO Router Attacks, IN DEPTH SECURITY VOL. II, 135, 2011.
[2]
Z. Hao, H. Wang and W. Hong, "A Novel Planar Reconfigurable Monopulse Antenna for Indoor Smart Wireless Access Points’ Application," in IEEE Transactions on Antennas and Propagation, vol. 64, no. 4, pp. 1250-1261, April 2016.
[3]
T. Rowan, “Negotiating WiFi security,” Network Security, vol. 2010, no. 2, pp. 8–12, 2010.
[4]
N. Rotenberg, H. Shulman, M. Waidner, and B. Zeltser, “Authentication-Bypass Vulnerabilities in SOHO Routers,” Proceedings of the SIGCOMM Posters and Demos on - SIGCOMM Posters and Demos 17, 2017.
[5]
D.K, Truptiben, Brute-force Attack “Seeking but Distressing”, International Journal of Innovations in Engineering and Technology 2, 3 (2013), 75–78, 2013.
[6]
A. Mallik, “Man-In-The-Middle-Attack: Understanding In Simple Words,” Cyberspace: Jurnal Pendidikan Teknologi Informasi, vol. 2, no. 2, p. 109, 2019.
[7]
P. Ramesh, D. Bhaskari, and Ch.satyanarayana, “A Comprehensive Analysis of Spoofing,” International Journal of Advanced Computer Science and Applications, vol. 1, no. 6, 2010.
[8]
K. Elleithy, D. Blagovic, W. Cheng, and P. Sideleau, “Denial of service attack techniques: Analysis, implementation and comparison,” Journal of Systemics, Cybernetics and Informatics, vol. 3, pp. 66–71, 01 2006.
[9]
M. V. Pawar and J. Anuradha, “Network Security and Types of Attacks in Network,” Procedia Computer Science, vol. 48, pp. 503–506, 2015.
[10]
M. Caneill,. and J.L. Gilis, Attacks Against The WiFi Protocols WEP and WPA, 2010. [Online]. Available:https://matthieu.io/dl/papers/wifi-attacks-wep-wpa.pdf. [Accessed Oct. 7, 2020].
[11]
H. Choudhary, and V. Poddar, A Comparative Analysis of Wireless Security Protocols (WEP and WPA2), 2014. [Online]. Available: http://airccse.org/journal/ijans/papers/4314ijans01.pdf. [Accessed Oct. 7, 2020].
[12]
P, Christensson, WPA Definition, 2006. [Online]. Available: https://techterms.com. [Accessed Oct. 7, 2020].
[13]
F.H, Katz, WPA vs. WPA2: Is WPA2 Really an Improvement on WPA?, 2010. [Online]. Available: http://infotech.armstrong.edu/katz/katz/Frank_Katz_CSC2010.pdf . [Accessed Oct. 7, 2020].
[14]
TX, Austin, Wi-Fi Alliance® introduces Wi-Fi CERTIFIED WPA3 security, October 2020. [Online]. Available:https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security. [Accessed Oct. 7, 2020].

Cited By

View all
  • (2024)Survey on Unified Threat Management (UTM) Systems for Home NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2024.338247026:4(2459-2509)Online publication date: Dec-2025

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICMECG '21: Proceedings of the 8th International Conference on Management of e-Commerce and e-Government
July 2021
122 pages
ISBN:9781450390545
DOI:10.1145/3483816
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 January 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Common Network Threats
  2. Kali Linux
  3. Network Penetration
  4. SOHO Router
  5. Wireless Access Points

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICMECG 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)68
  • Downloads (Last 6 weeks)20
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Survey on Unified Threat Management (UTM) Systems for Home NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2024.338247026:4(2459-2509)Online publication date: Dec-2025

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media