dc.description.abstract |
In this day and age, wireless is widely used in companies, institutions, schools, and so on for quick access to interact in sending data, accessing websites, and other interactions. In access to communicate with wireless networks, loopholes are found for people who are not responsible for carrying out illegal activities, such as man in the middle attack DNS spoofing. If the criminal activity occurs then how to prevent the crime or attack. And the results of the attack are obtained based on 7 tests by calculating the quality of service (QOS), namely packet loss with the results of attack 1 model 1 with packet loss 0.154%, attack 2 model 1 with packet loss 0.234%, attack 3 model 1 with packet loss 0.291%, attack 1 model 2 with packet loss 0.173%, attack 2 model 2 with packet loss 0.128%, attack 3 model 2 with packet loss 0.028%, attack 4 model 2 with packet loss 0.231%, which means this attack can run well. To prevent these illegal activities, first to know the technique of how the attack runs on a wireless network, using ettercap on kali linux. And for users of wireless network access, to find out that users are affected by attacks, they can use wireshark in monitoring network traffic, and are prevented by blocking attackers with an iptables firewall that is formed on the user's system, namely ubuntu which is connected to a wireless network.
Keywords: kali linux, ubuntu, wireless network, ettercap, man in the middle attack, DNS spoofing, wireshark, iptables | en_US |