ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Wireless Network Security Analysis

Verified

Added on  2020/03/23

|10
|1342
|65
AI Summary
This assignment focuses on analyzing wireless network security. It outlines the process of setting up a test access point, configuring it to allow only specific MAC addresses, and using tools like `airodump-ng`, `airmon-ng`, and `aireplay-ng` to capture and analyze wireless network traffic. The goal is to demonstrate how vulnerabilities can be exploited and how to implement security measures to protect wireless networks.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Table of Contents
1. Introduction................................................................................................................................1
Lab 3-Worksheet................................................................................................................................2
2. Conclusion...................................................................................................................................7
References...........................................................................................................................................7
1

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1. Introduction
The WPA2-PSK will be studied along with the WPA4-way handshake. The brute force
password crack will be used to extract the passphrase. The wireless network traffic will be
collected to find out the WEP key. For doing this action, some software and hardware tools are
required. By using the SSID, the AP WEP configuration will be performed. AP is an access
point. To connect wired LAN into wireless device, AP is used as a hub. It provides secure
connection. The MAC addresses of wireless network will be monitored. For providing the gain
address to the AP, MAC addresses will be predicted. MAC stands for Media Access Control. It
is a unique identifier. It is used for making the communication at the data link layer. The
Microsoft windows 2012 server will be installed. It will perform the authentication in active
directory domain. The client and server configuration of will be done in windows 2012 server
using some software and hardware. To carry out the MAC, address spoofing, WEP and WPA2
encryption, implementation is carried out in Kali Linux. Kali Linux is chosen to carry out the
process since it is easy for handling the encryption and recording, capturing and storing the
traffic. Kali Linux is one of the Linux platform derived based on Debian. Kali Linux is used for
penetration testing. Kali Linux has its host applications like back track, wire shark. Kali Linux
can be easily installed via bootable CD OR DVD. Kali Linux is mostly used for carrying out
forensic activities. Kali Linux has many tools. Some of the tools are wire shark, kismet, Maitego,
Ettercap and many. Kali Linux is also used for Ethical hacking techniques.
Lab 3-Worksheet
WEP is the abbreviation of Wired Equivalent Privacy.WEP is nothing but a security
protocol.WEP encryption is used for the purpose of providing security.WEP key can be entered
in 64 bits or 128 bits. Usually 128 WEP key's are preferred. The WEP key is entered as
hexadecimal characters.WEP key provides two types of authentication. The two types of
verification are
Open System certification
Shared Key certification
WEP also faces some security problems. The security problems are overcome by WPA
OR WPA2 security policies.WEP protocol is used to provide the security to the wireless
2
Document Page
networks. It has flaws in its design that is it can be decoded very easily and hence its
higher version keys called WPA2 keys are used. The keys are not sent over the networks
but are stored in a safer position in the windows registry.
Objective
To collect the wireless network traffic
To find the WEP key using he data collected
Hardware
2 x Computers installed with Windows XP/7/8 (1 x for BT, 1 x Wireless Client)
2 x wireless adapters (1 x Kali VM, must be supported with packet injection, 1 x
Wireless Client, can be any)
1 x AP capable of configuring static WEP keys.
Lots of network traffic over wireless network.
Software
Kali Linux VM
Kali Linux is used as a hacking tool and to do thee penetration techniques, Kali Linux is
mostly preferred over other operating systems.WEP hacking can also be carried out using
Kali Linux. Kali Linux is easy and painless to use and hence kali Linux is chosen by most
of the attackers.
Wireless access point monitoring can be carried out using Kali Linux. To add safety and
security to the network, WEP and WPA tools are used. The network can be secured in all
forms and in all hoist devices. The host devices can also be a laptop, computer, tablet and
can be other devices also. Data traffic is the term which deals with the data transfer
protocols passing. There are many protocols that pass through different network. For the
passage of such protocols, Tunnels are used. Such tunnels can create traffic disturbance if
many protocols pass over it in a limited time. Such passage of protocols will create more
data traffic. Data traffic tracking can be very useful in hacking the process that process
3
Document Page
that is carried over the network. Devices like routers and adapters can be encrypted for
the safe passage of data over the tunnel. Insecure passage may lead to leakage of
information that may help the black hackers access our datas. Penetration testing is done
with the help of Kali Linux.
Lab configuration
DHCP is disabled and Windows VM is connected to the wireless router
Access point is setup with the SSID 6EWS13.
Access point is secured with the 128 bit WEP key.
Disconnect the Ethernet cable and then connect it to the access point
Connecting an adapter with backtrack Linux
The second wireless adapter is connected with Kali Linux
MAC address of the wireless adapter is found out.
The connection of the adapter with kali Linux is checked by the command
airmon-ng
The adapter is set into monitor mode using the command airmon-ng start wlan0.
Collection of information
The command airodump-ng wlan0 is used for collecting the information about the wlan
Capturing wireless traffic
The WEP encrypted data is captured using the command airodump-ng -w dlink -c 6 –
bssid 00:26:5A:F2:57:2B mon0 where airodump-ng is the command.
File name, channel name, bssid are changed to match the test IP using the command
airodump-The commands like ng -w (ESSID) -c (channel) –bssid (BSSID) mon0 and
aireplay-ng -1 0 -a (BSSID) mon0 and Aircrack-ng are also usefull for this purpose
Results
4

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Cracking the key-Screenshots
1. Setting up of access point with SSID of 6EWSx
2. Finding out the MAC address of the wireless adapter on wireless client computer
Above are the details for wireless adapter “ipconfig /all”.
3. Configuring the access point to allow only the MAC address
5
Document Page
4. Windows 7 PC alone associates to the AP
Discovering the wireless network traffic
1. Run this iwconfig command. This command is used for configuring wireless adapter to
the monitor mode.
6
Document Page
2. Run the airmon-ng command to set monitor mode.
3. Confirming the wireless adapter is set to the monitor mode by using the iwconfig
command
4. By using the airodump-ng wlan1mon command all the wireless networks are scanned.
7

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5.BSSID and SSID for the WLAN is listed.
Connecting Kali Linux to the WLAN
1. Enable wireless in the network manager in kali linux.
2. Selecting wireless in order to connect to the wireless LAN
8
Document Page
BSSID STATION PWR RATE Lost frames
64:0F:28:68:A9:B1 IC:65:90:01:73:61 -74-----54 0- 0 10
64:0F:28:68:A9:B1 90:72:40:7F:BC:06 6- -75- -11 - 0 - 0
2. Conclusion
The WPA2-PSK would cover the WPA4-way handshake. The brute force password crack
would be used to extract the passphrase. The wireless network traffic would be collected
to find out the WEP key. For doing this action, some software and hardware tools are
required. By using the SSID, the AP WEP configuration would be performed. The MAC
addresses of wireless network would be monitored. For providing the gain address to the
AP, MAC addresses would be predicted. The Microsoft windows 2012 server would be
installed. It would perform the authentication in active directory domain. The client and
server configuration of would be done in windows 2012 server using some software and
hardware.
9
Document Page
References
1. Ramachandran, V., & Buchanan, C. Kali Linux wireless penetration testing.
2. Wrightson, T. (2012). Wireless network security. New York: McGraw-Hill
10
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]