Penetration Testing using Wireshark and Defensive Mechanisms Against MITM
V. Sahiti1, Prasanth. Tilakchand2, Balu. Kowshik3, Pokala. Avinash4, Simhadri Leela Kavya5

1V.Sahiti Department of ECE, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur-522502, (AP), India.
2Prasanth. Tilakchand, Department. of. ECE, Koneru. Lakshmaiah. Educa tion. Foundation, Vaddeswaram, Guntur 522502, (AP), India.
3Avinash. Pokala, Department. of. ECE, Koneru Lakshmaiah. Education. Foundation, Vaddeswaram, Guntur 522502, (AP), India.
4Simhadri. Leela. Kavya, Department. of. ECE. Koneru  Lakshmaiah Education Foundation, Vaddeswaram , Guntur-522502, (AP), India.
5Balu. Kowshik, Department.of.ECE.Koneru Lakshmaiah Education Foundation, Vaddeswaram, Guntur-522502, (AP), India.

Manuscript received on 23 March 2019 | Revised Manuscript received on 30 March 2019 | Manuscript published on 30 March 2019 | PP: 880-885 | Volume-7 Issue-6, March 2019 | Retrieval Number: F2489037619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Internet Of Things(IOT) is a trending technology which is making the digital world a better platform with wide variety of applications. In this context, the security of IOT device is a major concern which has attracted many researchers and made it necessary to strengthen the IOT system from vulnerabilities from attacker’s point of view. For which Penetration testing is the best technique. As the wireless technology advances, the security of the IOT devices should also advance. In this paper, Man-In-The-Middle (MITM) attack was performed using a simple Wireshark tool and the vulnerabilities were identified and different defensive mechanisms were outlined.
Keywords: Penetration testing, Wireshark, MITM , wireless devices, vulnerabilities, defensive mechanisms..
Scope of the Article: Mechanical Design