INFO 4370 Security of Wireless Systems Assignment

Assignment Help Computer Network Security
Reference no: EM132545790

INFO 4370 Security of Wireless Systems - Kwantlen Polytechnic University

I. Capture packets with your own computer (With Demo)
A. Please read the configure your system by following the Hardware and Software Requirement.docx document.
B. Set up your wireless router with WPA/WPA2 Personal (PSK) security mechanism and make a simple password (say, abcd1234).
C. Give an SSID to your access point and let the router broadcast the SSID.
D. Restart your router and connect your laptop wirelessly to the router.
E. Install the following software or download the executable files:
i. Wireshark (already in Kali Linux)
ii. airmon-ng (already in Kali Linux)
iii. airodump-ng (already in Kali Linux)
iv. aircrack-ng (already in Kali Linux)
v. aireply-ng (optional for the first section, but will be used in the second section)
F. Run "ifconfig" in your Kali Linux, make sure you can see your USB NIC (e.g., wlan0)
G. Put your NIC in monitoring mode. You can either use:
i. Method 1 (Preferred):
Run:
ip link set your-wireless-interface-name-heredown
Run:
iwconfigyour-wireless-interface-name-heremode monitor
Run:
ip link set your-wireless-interface-name-hereup
or use:
ii. Method 2 (You may need to kill some networking related processes):
Run:
airmon-ng start your-wireless-interface-name-here
H. Run
airodump-ngyour-monitoring-interface-name-here
Now you can monitor the packers from different access points near you.
I. Look for your AP from the listed ESSIDs, and record its BSSID in the first column. Also record the channel number in the CH column.
J. Stop your running "airodump-ng" program and rerun it as follows:
airodump-ng --bssidyour-recorded-BSSID-here --channel your-recorded-channel-number-here --write result your-monitoring-interface-name-here
Now, airodump-ng program only monitors your access point.
K. Break your WiFi connection manually, and reconnect it again, you should see your running airodump-ng program can capture the 4-way handshake files.
L. Use aircrack-ng to crack the password.

II. Capture the packets from other access points.

A. Reproduce the same steps from A to I.

B. Use a second laptop connect to the router. You can see the new laptop listed in STATION column. Record its MAC address. We refer to this as station-mac-address

C. Run command aireply-ng -0 5 -a your-recorded-BSSID-here -c your-recorded-station-mac-address.
This command sends the de-authentication attack packet to de-authenticated the station with that MAC address.

D. The station will launch the 4-Way handshake automatically. You should be able to capture the packet, even though you are NOT a part of the network.

E. Use aircrack-ng -w to crack the password.

Attachment:- Security of Wireless Systems.zip

Reference no: EM132545790

Questions Cloud

Compare how target has done to the industry averages : Compare how Target has done to the industry averages. Do you notice any trends that are positive or negative? Does anything look good or bad
Calculate the after-tax cost of debt : The interest is paid annually at a rate of 12 percent. The firm's tax rate is 40 percent. Calculate the after-tax cost of debt
How to compute the variances for raw materials : How to Compute the variances for raw materials, direct labor, and variable overhead, assuming that the price variance for materials is recognized
Journalize the entries to record the transactions of Hanoi : Hanoi Company uses the perpetual inventory system. Journalize the entries to record the transactions of Hanoi Company
INFO 4370 Security of Wireless Systems Assignment : INFO 4370 Security of Wireless Systems Assignment Help and Solution, Kwantlen Polytechnic University - Assessment Writing Service
What impact if any do international accounting standards : What impact, if any, do international accounting standards (i.e., the International Financial Reporting Standards developed by the International Accounting)
Compute first-year and second-year depreciation expense : Compute first-year and second-year depreciation expense, accumulated depreciation and ending book value on the plane using Straight-line method
Information governance for cloud computing : Information Governance for Social Media. Information Governance for Mobile Devices. Information Governance for Cloud Computing
Create an multiple -step income statement : Question - Presented below is information for Annie Company for the month of March 2018. Create an multiple -step income statement

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd