%0 Conference Proceedings %T Evil-AP - Mobile Man-in-the-Middle Threat %+ Warsaw University of Technology [Warsaw] %A Breński, Kamil %A Chołuj, Maciej %A Luckner, Marcin %Z Part 7: Various Aspects of Computer Security %< avec comité de lecture %( Lecture Notes in Computer Science %B 16th IFIP International Conference on Computer Information Systems and Industrial Management (CISIM) %C Bialystok, Poland %Y Khalid Saeed %Y Władysław Homenda %Y Rituparna Chaki %I Springer International Publishing %3 Computer Information Systems and Industrial Management %V LNCS-10244 %P 617-627 %8 2017-06-16 %D 2017 %R 10.1007/978-3-319-59105-6_53 %Z Computer Science [cs] %Z Humanities and Social Sciences/Library and information sciencesConference papers %X Clients of public hotspots are exposed to various threats including a man–in–the–middle attacks. To stress existing threats we created the Evil-AP application for demonstrating a man–in–the–middle attack. The application, installed on an Android phone with root permissions, turns on hotspot services and performs network redirection. We tested as the proposed techniques can be used to eavesdrop, redirect, inject, and strip the Internet traffic. A mobility of the created solution together with the wide functionality creates an extremely dangerous tool. Therefore, we concluded our work with good practices that allow the users to avoid similar threats as described in our work. %G English %Z TC 8 %2 https://inria.hal.science/hal-01656261/document %2 https://inria.hal.science/hal-01656261/file/448933_1_En_53_Chapter.pdf %L hal-01656261 %U https://inria.hal.science/hal-01656261 %~ SHS %~ IFIP-LNCS %~ IFIP %~ IFIP-TC %~ IFIP-TC8 %~ IFIP-CISIM %~ IFIP-LNCS-10244