ESP8266 and WIiFi PenTest

Petter Anderson Lopes[1]

Abstract: Mobile devices have become more and more powerful, these devices and their apps have become foundational tools. To improve productivity, these devices are begin integrated into the daily business process and operations of organizations. However, now organizations need establish security and compliance policies to support mobility and growing use of BYOD (Bring Your Own Device). The movement BYOD, is a trend that is gaining strength in the corporate environment. BYOD is a program that allows employees to use their personal devices to carry out their professional activities. With so much diversity in technology, it’s difficult to control what employees have access to, or applications that are installed on their devices. So, when the wireless network is being used, the risk is bigger. To benefit its customers, business establishments, department stores, like as coffee bar, shopping centers, share wireless network. This article aims to demonstrate different views on sniffing techniques in wireless networks. With the growing need to keep people connected, Wireless networks become the escape valve to address this demand. However, how exactly do these networks work? Issues related to the professional activities of digital analysis with the use of network sniffers, which are programs that have the function of capturing the packets that travel in the network, however it is evident the difficulty of staying safe in such an environment. Detect security flaws, allow for intrusions and data evasion, to simply and directly analyze information that travels on the network at any given time. Get sensitive data from users in a mixed environment, where everyone is connected to different devices, but using Wireless technology. How ARP table poisoning works and how to use it to collect sensitive information.

Keywords: Wireless. Sniff. Security. Attack. ARP.

To read the full article subscriber to our newsletter.