This document describes some strategies to prevent man in the middle attack on a network wireless LAN 802.11n, to do this, the man in the middle attack is implemented in a LAN domestic network and each proposed strategy has been validated in order to register the results. Man in the middle attack consists of ARP poisoning and DNS spooling which aims to redirect victim's HTTP requests to a web server installed on the machine of the attacker, in this way, the victim would always be re-directed to a site hosted on the web server of the attacker, disregarding to which domain the victim is pointing at; each strategy was validated and moderately successful results were found due to technical or administrative implications of each setting. Considering that for this article, an attack with particular characteristics was done, some strategies are expected not to work in all scenarios in which case it would be required to combine them or modify them.
展开▼