A Proof of MITM Vulnerability in Public WLANs Guarded by Captive Portal

  • Chen W
  • Wu Q
N/ACitations
Citations of this article
15Readers
Mendeley users who have this article in their library.

Abstract

In this paper, A lot of public areas provide the WLAN service for nomadic users so that they can finish the tasks even when they are out of office. Therefore, the security of public WLANs is more important than past. Nowadays many public WLANs service providers the Captive Portal to authenticate users. The Captive Portal uses a webpage to request a user to authenticate himself by providing his own username and password. This security mechanism proved to be simple and effective because users cannot access Internet before they get authenticated. However, in this paper, we shall illustrate that for public WLANS which are guarded by Captive Portal, will be vulnerable to man-in-the- middle attacks. Therefore, a hacker can careful send out some spoofing packets and take advantage of the public WLAN to access Internet without being authenticated. We show the vulnerability by both protocol analysis and a real implementation in C programs.

Cite

CITATION STYLE

APA

Chen, W.-L., & Wu, Q. (2010). A Proof of MITM Vulnerability in Public WLANs Guarded by Captive Portal. Proceedings of the Asia-Pacific Advanced Network, 30(0), 66. https://doi.org/10.7125/apan.30.10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free