Hot-spot fishing simulation method and device

A simulation method and hotspot technology, applied in security devices, electrical components, wireless communications, etc., to achieve the effect of improving network security awareness

Inactive Publication Date: 2019-01-22
BEIJING KNOWNSEC INFORMATION TECH
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the above-mentioned deficiencies in the prior art, the purpose of this application is to provide a hot-spot fishing simulation method and device to solve or improve the above-mentioned problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hot-spot fishing simulation method and device
  • Hot-spot fishing simulation method and device
  • Hot-spot fishing simulation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0049] Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in the present application without creative efforts shall fall within the protection scope of the present application.

[0050] It should ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application provide a hot spot fishing simulation method and device. A target AP to be attacked is attacked to disconnect the target AP from a currently connected target terminal, thereby suppressing the original target AP and simulating an induced hot spot identical to the hot spot identification of the target AP. Then, the inducing AP is created, which is identical tothe hot spot identification of the target AP, and the password information input when the target terminal disconnected from the target AP establishes connection with the inducing AP is obtained, so asto induce the user to connect to the inducing hot spot to realize the phishing simulation, and effectively improve the probability of the inducing AP being accessed. In addition, after the communication connection with the target terminal, by hijacking the traffic information of the target terminal and extracting the corresponding sensitive information from the traffic information, the corresponding security education report is generated according to the sensitive information and the cipher information, so as to carry out the security education to the user in an experiential manner, so as toimprove the network security consciousness of the user.

Description

technical field [0001] The present application relates to the field of safety education, in particular, to a method and device for simulating hotspot fishing. Background technique [0002] In today's era, the use of Wi-Fi (Wireless-Fidelity, Wireless Fidelity) has become very common. Whether it is public institutions, offices, or family life, a large number of Wi-Fi hotspots have been deployed to facilitate people's access to the network. Among the large number of Wi-Fi hotspots, quite a few have security risks. For example, maliciously deployed hotspots can be used to obtain personal privacy information, monitor communication traffic, and so on. Although access to malicious hotspots can be avoided to a certain extent through certain identification methods, it is difficult to identify fake hotspots. [0003] Based on this, it is possible to experientially conduct security education to users through active phishing simulations, so as to improve the public's awareness of Wi-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04L29/06H04W12/122
CPCH04L63/1483H04W12/08
Inventor 杨刘沈龙
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products