Preview

Lab 8 Questions

Satisfactory Essays
Open Document
Open Document
306 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 8 Questions
Hassan Abbiss
IS4560
Lab 8 Questions

1. Airmon-ng: This script can be used to enable monitor mode on wireless interfaces. It may also be used to go back from monitor mode to managed mode.
Airodump-ng: Airodump-ng is used for packet capturing of raw 802.11 frames and is particularly suitable for collecting WEP
Aireplay-ng: Aireplay-ng is used to inject frames
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured
2. To prevent outsiders from exploiting connected resources and sniffing data that is being transmitted. The best encryption method is WPA2.
3. Considerations should be made to turn off broadcast of the SSID.
4. Disabling the SSID feature also makes it difficult for hackers to break into your home or organization network.
5. Wireless allows connections to computers in areas where wires cannot reach or would be expensive to install.
6. Connecting network elements by radio waves instead of wires presents many challenges. From the reliability standpoint, it is difficult to predict a priori the dependable coverage of a wireless network radio inside a building. Wireless LANs broadcast data into space, where they can be intercepted by anyone with the ability to listen in at the appropriate frequency.
7. Because WiFi signals are radio waves, anyone within range of a public WiFi network can listen in on what users are sending and receiving.
8. WiFi Protected Access version 2 (WPA2) and using VPN
9. Policies are the guide lines or strategies that assist users to protect them selves from un-warranted harm. Also audits and surveys, discover any vulnerabilities that may harm a user.
10. Same concept as a (hotspot) connection, if the AP is password protect, a hacker can easily access your phone network and discover private information.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1210 LAb6.1

    • 401 Words
    • 2 Pages

    WLAN is used in home because there easier to maintain and to take care of it I could be private.…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1210 U6 Lab

    • 447 Words
    • 2 Pages

    3. WLAN is used in home because there easier to maintain and to take care of it I could be private.…

    • 447 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    3. E-commerce involves the passing of sensitive information like credit card numbers or bank account numbers over the internet, and the risk of losing the privacy of this information is high in public places. –Theft of unencrypted wireless data can easily occur in public areas because WiFi hotspots do not provide encryption such as WEP, WPA, or WPA2, in order to simplify the connection process and minimize the management workload. –Evil twin hotspots: these are hotspots setup by a hacker and made available to the public. Unknowing users who connect to the intent using these access points are then exposing their sensitive information to the hacker. To avoid being tricked by this set up, check to see if the login to a WiFi hotspot is SSl encrypted and look for a valid security certificate.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    eviltwinattack

    • 3867 Words
    • 15 Pages

    According to a recent study, 42% of wireless 802.11 access points (APs) provide no security mechanisms — not even WEP or WPA [1]. Often times, wireless APs are left open for convenience. For example, a coffee shop or bookstore may wish to offer a free wireless service, so there is no need to authenticate its wireless users. However, wireless clients that use these APs are vulnerable to a number of trivial threats such as eavesdropping and injection attacks. An additional and often over-looked vulnerability caused by using open APs is the access point impersonation attack.…

    • 3867 Words
    • 15 Pages
    Powerful Essays
  • Powerful Essays

    Wifi Hacking

    • 3190 Words
    • 13 Pages

    Jeremy Martin, CISSP-ISSAP, NSA-IAM/IEM, CEH – jeremy@infosecwriter.com It is a cloudy Friday night and I am in the listening to another episode of 2600’s “Off the hook” radio when the interruption of the phone catches my attention. I had been expecting the call from my colleague, because I needed help with some new proof-ofconcept ideas for a penetration test I have the following week. During the conversation, we eagerly decided to head out for the night to Wardrive in the area. Wardriving is always a good excuse to test new programs and ideas. We position both laptops for optimal WiFi signal, easy access to the GPS devices, and secure them for the least amount of movement while driving. Right before we leave, we make sure the power converter is turned on, and the systems are plugged in. To cover all our bases, one laptop runs Windows XP Pro, NetStumbler, and Cain&Able while the second system has Suse 9.2 Linux with Kismet, Airsnort, Aircrack, and Void11. Using two devices with such different environments improves success while surveying WiFi in an area or “footprinting” them. Here is where the fun begins. After driving for a few miles, we enter a well lit street in the business section of town, and hear the ping of live access points every few seconds. Even though we have been doing this for years, we are both amazed at the percentage of companies that employ WiFi that do not implement any sort of encryption. This allows us to park and let Kismet do what it does best... passively listen to network traffic running over the 802.11 signal. We are able to map several subnets and gather other interesting information being broadcast to the public. At the end of the night, we were able to gather over 127 WiFi hotspots after only driving seventeen miles round trip. With this type of information gathered, playtime for hackers begins.…

    • 3190 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    This paper begins by introducing the concept of WLAN. The introductory section gives brief information on the WLAN components and its architecture. In order to examine the WLAN security threats, this paper will look at Denial of Service, Spoofing, and Eavesdropping. The paper will then explain how Wired Equivalent Privacy (WEP) works, which is the IEEE 802.11b/WiFi standard encryption for wireless networking. The discussion of WEP continues by examining its weaknesses, which result in it being much less secured than what was originally intended. This situation leads to further research regarding practical solutions in implementing a more secured WLAN. This paper will also cover the new standards to improve the security of WLAN such as the IEEE 802.1x standard, which comprises of three separated sections: Point-to-Point Protocol (PPP), Extensible Authentication Protocol (EAP) and 802.1x itself. The 802.1x is actually included in 802.11i, a newly proposed standard for key distribution and encryption that will play a big role in improving the overall security capabilities of current and future WLAN networks. The 802.11i standard provides two improved encryption algorithms to replace WEP, which are Temporal Key Integrity Protocol (TKIP) and CBC-MAC Protocol (CCMP). This paper will also list down several products that will assist users to protect their wireless networks from attacks. Finally, this paper ends with the conclusion of highlighted issues and solutions.…

    • 5329 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    Wireless Network Security

    • 6539 Words
    • 27 Pages

    Wireless networking is inherently insecure. From jamming to eavesdropping, from man-inthe middle to spoofing, there are a variety of attack methods that can be used against the users of wireless networks. Modern wireless data networks use a variety of cryptographic techniques such as encryption and authentication to provide barriers to such infiltrations. However, much of the commonly used security precautions are woefully inadequate. They seem to detract the casual sniffer, but are unable to stop the powerful adversary. In this article, we look into the technology and the security schemes in IEEE 802.11, cellular and Bluetooth wireless transport protocols. We conclude that the only reliable security measure for such networks is one hat is based on application level security such as using a VPN.…

    • 6539 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    Wifi

    • 10873 Words
    • 44 Pages

    Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections.…

    • 10873 Words
    • 44 Pages
    Powerful Essays
  • Powerful Essays

    Why we use wireless? It is useful, convenient, mobility. For example: If you are siting in café with your mobile phone or other devices. You can use wireless to connect to an Internet, to talking with your friends , to transmitting data, to watching videos etc.…

    • 1194 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    2. Securing the SSID: This identifies the network. A client must know the access points SSID in order to get into the wireless network. By preventing unauthorized clients from discovering the SSID, you prevent them from accessing your network. Things you can do to secure the SSID:…

    • 667 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Engineering Research Paper

    • 1272 Words
    • 6 Pages

    You are recommended to select Most Security (WPA2-PSK) to secure your wireless network. Enter a key of 8~63 characters and click Next.…

    • 1272 Words
    • 6 Pages
    Satisfactory Essays
  • Best Essays

    This research examined the effects of WiMAX on our lives. Also, shows the advantages of using this technology, even if we have alternatives. On the other hand, see the effect of this technology on our lives. WiMAX has developed rabidly, and has challenged with other technologies such as LTE. Since this growth and escalating on using it, this research will focus on how this technology is impact people’s life.…

    • 1879 Words
    • 8 Pages
    Best Essays
  • Satisfactory Essays

    edwkejdn

    • 419 Words
    • 2 Pages

    a) Frequency of operation i) 902-928 MHZ ii) 2.4-2.483 GHZ iii) 5.725-5.875 GHZ b) Transmit power limitation i) 1 watt for DSSS and ii) Low power with any modulation for FHSS.…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Wifi

    • 580 Words
    • 3 Pages

    Communication is a very important factor in the Wi-Fi access. How will students communicate with friends and family? How will they make new friends? We need to communicate everyday to know what is happening around us. We need to contact our friends and family to see how they are doing, to know more about them and not lose that bond we have with them from the beginning. Worried about the expense? Now there are different ways of communicating with people. There are calls, video chats, and Facebook and all are free of…

    • 580 Words
    • 3 Pages
    Good Essays