logo

Wireless Technologies: Wireshark, Cain and Abel

The assignment is to become familiar with WLAN tools and develop an understanding of wireless technologies used in various networks.

25 Pages3468 Words2 Views
   

Added on  2022-12-22

About This Document

This document provides an overview of two wireless technologies: Wireshark and Cain and Abel. It discusses their complexity, functionality, features, advantages, and disadvantages. The document also includes information on three latest technologies: WiGig, Bluetooth Smart, and Apple iBeacon.

Wireless Technologies: Wireshark, Cain and Abel

The assignment is to become familiar with WLAN tools and develop an understanding of wireless technologies used in various networks.

   Added on 2022-12-22

ShareRelated Documents
Running head: WIRELESS TECHNOLOGIES
WIRELESS TECHNOLOGIES
Name of the Student:
Name of the University:
Author Note:
Wireless Technologies: Wireshark, Cain and Abel_1
WIRELESS TECHNOLOGIES
2
Table of Contents
PART A:.....................................................................................................................................4
Tools Installation:.......................................................................................................................4
1. Wireshark............................................................................................................................5
Complexity.................................................................................................................................8
Functionality..............................................................................................................................8
Features......................................................................................................................................9
Advantages and Disadvantages..................................................................................................9
Summary..................................................................................................................................10
2. Cain and Abel...................................................................................................................10
Complexity...............................................................................................................................11
Features....................................................................................................................................11
Functionalities:.........................................................................................................................13
Advantages and Disadvantages:...............................................................................................13
Summary..................................................................................................................................13
PART B....................................................................................................................................14
Three latest technologies..........................................................................................................14
WiGig.......................................................................................................................................15
Real time application............................................................................................................15
Strength................................................................................................................................15
Weakness..............................................................................................................................15
Security issues......................................................................................................................16
Bluetooth Smart...................................................................................................................17
Real time application............................................................................................................17
Strength................................................................................................................................17
Weakness..............................................................................................................................18
Security issues......................................................................................................................18
Wireless Technologies: Wireshark, Cain and Abel_2
WIRELESS TECHNOLOGIES
3
Apple iBeacon..........................................................................................................................19
Real time application............................................................................................................19
Strength................................................................................................................................19
Weakness..............................................................................................................................19
Security issues......................................................................................................................20
Best out of the above three.......................................................................................................20
References:...............................................................................................................................21
Wireless Technologies: Wireshark, Cain and Abel_3
WIRELESS TECHNOLOGIES
4
PART A:
Tools selected for Installation:
1. Wireshark
2. Cain and Abel
Wireless Technologies: Wireshark, Cain and Abel_4
WIRELESS TECHNOLOGIES
5
1. Wireshark
Wireless Technologies: Wireshark, Cain and Abel_5
WIRELESS TECHNOLOGIES
6
Wireless Technologies: Wireshark, Cain and Abel_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Wireless: WLAN Tools, Packet Capture, and Wireless Technologies
|16
|2601
|65

Lab Exercises on Digital Security Fundamentals, Cryptographic Principles, Symmetric Encryption, Asymmetric Encryption, and Secure Hash Functions
|33
|6001
|366

Intrusion Detection System and Snort: A Comprehensive Guide
|8
|857
|312