Professional Documents
Culture Documents
báo cáo thực tập
báo cáo thực tập
10/05/17 2
Gii thi u tai
Ni dung d kin
Chng 1. Tng quan v mng khng dy
Chng 2. Mt s phng phap tn cng mng khng dy
Chng 3. Kim th an toan cho mng khng dy
Chng 4. Th nghim kim th an toan cho mng khng
dy.
10/05/17 3
Ni dung t c
Chng 1. Tng quan v mng khng dy
Khai nim mng khng dy
Cac chun mng khng dy
Cac phng thc bo mt trong mng khng dy
Thc trng mt an ninh an toan ca mng khng dy
10/05/17 4
Ni dung t c
CHNG 2. MT S PHNG PHP TN CNG MNG
KHNG DY
Cac im yu mng khng dy
Cac phng phap tn cng mng khng dy ph bin:
Tn cng bi ng- Nghe tr m
(Passive Attack hay Eavesdropping)
Tn cng ch ng Active Attack (kt ni, thm d va cu hnh mng)
Tn cng kiu chen ep (Jamming Attack)
Tn cng kiu thu hut (Man-in-the-middle Attack)
Tn cng gi mo (ROGUE ACCESS POINT)
De-authentication Flood Attack(tn cng yu cu xac thc li )
Tn cng da trn s cm nhn sng mang lp vt l
Tn cng ngt kt ni (Denial of Services Attack )
10/05/17 5
Kh khn gp phi
Tai liu nghin cu cn hn ch
Kh nng dich cha tt
Hn ch v thi gian
10/05/17 6
Kt lun & Hng phat trin
ng gp chnh ca tai
Cac c s l thuyt lin quan n muc tiu tai.
Gii thiu c phng phap kim th an toan cho mng
khng dy.
Hng phat trin
Tip tuc hoan thin tai trong thi gian ti.
10/05/17 7
Tai liu tham kho
Ti liu sch
[1] Vivek Ramachandran, Cameron Buchanan, Kali Linux Wireless Penetration Testing
Beginners Guide
[2] V Quc Oai, Thit K Mng Khng Dy, TP. HCM, Vit Nam: B Giao Duc va ao
To, 2013.
Ti liu Internet:
[3] Lm Th Nhn , Tng Quan V Mng Khng Dy:
www.vnpro.org/forum/forum/ccent/icnd-1-basic-wireless-lan-config/12084-tng-quan-v-
mng-khng-dy.
[4] Nguyn Duy Mn , Tm Hiu V An Ninh Mng Khng Dy:
https://prezi.com/fkao0jbjse5f/an-ninh-mang-khong-day/
[5] Wireless Security Wikipedia:
https://en.wikipedia.org/wiki/Wireless_security
[6] ng Phm Phuc Duy, Nguyn Hoang Quc Phong, Cc kiu tn cng trn mng , Lun
vn tt nghip c nhn CNTT, H Ngoi Ng Tin Hc TP. HCM, 2010.
10/05/17 8