Mohammed Y. Thanoun

Work place: Department of Electrical Engineering, University of Mosul, Mosul, Iraq

E-mail: myounisth@uomosul.edu.iq

Website: https://orcid.org/0000-0002-2852-3917

Research Interests:

Biography

Mohammed Younis Thanoun completed the B.S. in electrical engineering/ electronic and communication from the University of Mosul, Iraq, in 1991 and received the M.Sc. degree in electronic and communication in 2000 and Ph.D. in 2011 from Mosul University. He is interested in the field of computer networks and communication and he has published research papers in Deep Learning, SDN, machine learning algorithms and cybersecurity engineering He has been working as an assistant professor at the University of Mosul since 2021. He is a member of the computer networks lab in the Electrical Dept / Engineering College.

Author Articles
Wi-Fi Attacks by Exploiting ARP and DNS Vulnerabilities: A Security Study

By Asmaa A. Ghanim Mohammed Y. Thanoun

DOI: https://doi.org/10.5815/ijwmt.2025.05.03, Pub. Date: 8 Oct. 2025

This research aims to evaluate the security risks associated with open wireless networks, especially Man-in-the-Middle (MITM) attacks that exploit the Address Resolution Protocol (ARP) and Domain Name System (DNS). The penetration testing process was conducted by creating a secure and controlled laboratory and using a set of tools available in Kali Linux to demonstrate how attackers can exploit these vulnerabilities to gain unauthorized access to victims' devices, steal their sensitive data, and control their devices remotely The research focused on analyzing the effectiveness of social engineering (phishing) attacks under MITM attacks, where a fake web page was created to trick victims into entering their personal data and another web page was created to try to trick victims into downloading malware consisting of an attack payload that aims to create a Reverse Transmission-Control-Protocol (TCP) shell that enables the hacker to explore the target device and execute code using the Metasploit framework. The research results showed the effectiveness of combining ARP and DNS spoofing with phishing attacks and malware injection attacks. The results also showed that open wireless networks are highly vulnerable to attacks and that end users are the weakest link in the security chain. The research also emphasizes the need to develop more effective security solutions to protect core protocols such as ARP and DNS.

[...] Read more.
Evaluating the Effectiveness of WPA3 Protocol against Advanced Hacking Attacks

By Asmaa A. Ghanim Mohammed Y. Thanoun

DOI: https://doi.org/10.5815/ijwmt.2025.04.01, Pub. Date: 8 Aug. 2025

Personal Mode Home Wi-Fi networks are an integral part of our daily lives, providing convenience and ease of access to the Internet. However, many people believe that modern encryption protocols such as Wi-Fi Protected Access3 (WPA3) provide sufficiently strong protection. This research aims to evaluate the effectiveness of encryption protocols used in home Wi-Fi networks, focusing on the currently most widely used Wi-Fi Protected Access2 (WPA2) protocol and the newer and more secure WPA3 protocol, and the effectiveness of the Protected Management Frames (PMF) against deauthentication attacks. A penetration test was conducted in a controlled, secure environment using a set of specialized tools such as Aircrack-ng, Fluxion, Bettercap, and Wireshark to assess the vulnerability of these networks to various attacks. The research results showed that home Wi-Fi networks using WPA2 protocol and WPA3 protocol (who support transitional mode) are vulnerable to hacking. deauthentication attacks and dictionary attacks were successful in hacking networks, especially when the passwords were weak or could be guessed. In addition, evil twin attacks using the captive portal approach have been proven effective in penetrating networks that use WPA2 and WPA3 (even when they do not support transitional mode) by exploiting weaknesses in user behavior. The results also show that deauthentication attacks are still effective before establishing a 4-way handshake. This paper proposes some countermeasures to reduce the risk of home network penetration.

[...] Read more.
Other Articles