Paper
9 February 2012 Using wi-fi hotspots as an intrusion vector into corporate networks
Maximilian Scharsich, Friedrich L. Holl
Author Affiliations +
Abstract
The following paper describes a method of gaining access to corporate networks through users who use virtual private networks over a modified Hotspot under the control of an attacker.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Maximilian Scharsich and Friedrich L. Holl "Using wi-fi hotspots as an intrusion vector into corporate networks", Proc. SPIE 8304, Multimedia on Mobile Devices 2012; and Multimedia Content Access: Algorithms and Systems VI, 83040C (9 February 2012); https://doi.org/10.1117/12.908482
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Internet

Control systems

Network security

Computer security

Data communications

Java

Multimedia

RELATED CONTENT

Study of risk based on web software testing
Proceedings of SPIE (March 20 2013)
IoT-based flood embankments monitoring system
Proceedings of SPIE (August 07 2017)
Media delivery and media service overlays
Proceedings of SPIE (March 14 2005)
A secure wireless mobile-to-server link
Proceedings of SPIE (January 28 2009)
Interactive personalized newspaper on the WWW
Proceedings of SPIE (March 25 1996)

Back to Top