Sei sulla pagina 1di 86

1

Week 1-Hands-on Project-CTC395

Page 31-34-Text Book

Project 1-1: Locating Area Hotspots with Hotspot Locations


2

In the hotspot information we find:

1. Access: Free
2. Activation: active
3. Technology: WLAN (802.11b, Wi-Fi)
4. SSID: cup o’ joy

Yes, the information the webpage provide is useful, because we can see if the location is near from us,
and we could have free access, due the hotspot is free for use.
3

Project 1-2: Locating Area Hotspots with Hotspot

The domain hotspotr.com/Wi-Fi, cannot be accessed anymore, due that the domain is on sale, However,
we find an example of what a hotspot information can provide for compare Hotspot-Locations and
Hotspot. These are the snapshots:

The difference between Hotspot-Locations and Hotspot are these:

Hotspot Locations Hotspot Hotspot Continued


Type, Phone, Email City/Region/Zip Code DNS information
Operator Organization IP Address
Activation Internet Service Provider Domain Name Servers
Technology Domain Information Mail Exchange
SSID Domain Site Response Header
Registrar Response
Registrar URL Server
Whose Server Date
Created Content - Type
Updated Cookie
Expires
Time Left
Status
DNS server

Checking all this information listed, Hotspot provide most comprehensive information about the
features like domain and DNS information. Yes, I would recommend the Hotspot, because the
information that provide is more comprehensive, and can be more useful to configure the wireless
connection.
4

Project 1-3: Installing Network Meter Gadget

The speed test cannot be checked because the license of the gadget had expired.
5

Case Project 1-4: IEEE and Wi-Fi

Page 70 –75-Text Book

Project 2-1: Investigating Microsoft Windows 7 WLAN AutoConfig

We Began to use the WLAN configurations and found a that our wireless connections was as strong as
ever.

The Autoconfigurations that the windows comes with is something that we recommend as this is the
most basic and easiest form to establish your Wi Fi connection
6
7

Project 2-3: Installing and Using Virtual Router

In this step, we downloaded the virtual router per instructions. The router was a very useful tool.
8

Project 2-4: Installing and Using Connectify


9

Hands-On project

Page 112

Project 3-1-Using the Microsoft Windows 7 Netsh Utility


10
11
12

Page 114

Project 3-2- Installing and Using Vistumbler

7. Note the columns Signal and High Signal. Why does the Signal column change?

Because the signal strength are in constant change, so, for one or other reason the signal or high signal cannot have
the same strength.

9. Click Show Signal dB (Estimated). The columns Signal and High Signal now provide the
estimated db. How does it compare to the percentage values?

Values can be relative, from one moment to other, so values still constant.

11. Click one of the APs displayed at the bottom of the screen. Allow Vistumbler to accumulate data over several
minutes. What information is displayed on this graph?
13

The signal keeps on same rate, and its lower point variation is not too frequent.

13. Click another one of the APs displayed at the bottom of the screen. Allow Vistumbler to accumulate
data over several minutes. What information is displayed on this graph? How is this different from the
previous graph?

The information presented in the chart looks more detailed, where we can observe the crests and
downs in the chart with more exactitude.
14

Page 115

Project 3-3- Comparing Vistumbler Information

3. Basically is almost the same features that Vistumbler and Command Prompt show, the difference is
that in the Vistumbler window we see the Basic Transfer Rate, Manufacturer, and Label.

9. Next view the WLAN interfaces for this computer. Type show interfaces and press Enter. Note the
percentage, and compare that with the percentage from Vistumbler. Are they the same? Yes, Both show
the same percentage..
15

Page 115

Project 3-4- Installing and using insider

1. Use your Web browser to go to the link www.metageek.net/support/downloads

inSSIDer
 Version 2.1.5.1393 (June 26, 2012) – Release Notes – Download
 Version 2.1.4.1391 Download the previous version.
inSSIDer is the best free Wi-Fi network scanner for Windows 7, Vista and XP. Because NetStumbler
doesn’t work well with Vista and 64-bit XP, we built an open-source Wi-Fi network scanner designed
to work on all current generations of the Windows operating system. inSSIDer has been reviewed by
Lifehacker and Tekzilla and has been downloaded over 1.5 million times.

Due that the link of the version that document offer is not downloaded anymore, and the
most version downloaded, 4, has to be purchased for used, we use the version inSSIDer
3.0.7.48, for the assignment purpose.

7. Click the 2.4 GHz Channels tab in the lower portion of the screen. This displays the dB in real time.
Now click the Time Graph tab, which displays the dB signal strength as a line graph over time. Compare
the two graphs.
16

8. The inSSIDer application can scan both 2.4 GHz as well as 5.0 GHz. Click the 5 GHz Channels
tab to determine if there are any 5 GHz networks in your area. If not, switch back to 2.4 GHz.

9. Select a specific network by clicking it. What happens to the graphs when you select a
network?
17

The curve changes due power of the signal and connectivity, depending of the network that we
choose. The curves may have a big crest or can be more wide.

10. Notice that “RSSI” is displayed in the table at the top of the application. However, the values
displayed are identical to the dB values in the graph. Do you think this is actually the RSSI or is it
dB? Why? (Hint: Consider if the numbers are negative or positive.)
18

I think is the RSSI, because even when is the same connection, the strength of the signal can
change in big or small amount. Both, Vistumbler and InsiDDer present negative number.

11. Compare Vistumbler with inSSIDer. Which gives more detailed information? Which do
you prefer? Which application would you recommend to a friend? Why? Vistumbler shows a
wide informative spectrum of each Connection, but, inSSIDer is more colored, the main window
separate, chart, connections and Bands (2.4 GHz and 5 GHz).
19

Project 1- Inspector Wireless Monitor-Downloading and installing Xirrus Wi-Fi

1. Use your Web browser to go to the link

www.xirrus.com/library/wifitools.php

The Xirrus Wi-Fi Inspector is a powerful tool for managing and troubleshooting the Wi-Fi on a Windows XP SP2 or
later, Vista, or 7 laptop. Built in tests enable you to characterize the integrity and performance of your Wi-Fi
connection.

 Searching for Wi-Fi networks


 Managing and troubleshooting Wi-Fi connections
 Verifying Wi-Fi coverage
 Locating Wi-Fi devices
 Detecting rogue APs

 Wi-Fi Inspector v1.2.1.4


 Inspector User Guide v1.2.1 RevB-6
The teacher uses a different sources for get the questions for the quizzes
20
21
22
23

Project 2- CommView for WiFi


http://www.tamos.com/download/main/ca.php

Problem Description
Wi-Fi is relatively easy to configure, but optimizing, securing, and diagnosing problems with a
wireless network can be a challenge. In this lab, Here are free tools that can help.

Outcome
Report the steps for performing the task above.

Validation/Evaluation
 Detect a wireless access point with CommView for WiFi, Wireless Wizard
CommView for WiFi is a packet sniffer that is specifically designed for Wi-Fi networks. As you
would expect, the program allows you to capture packets and then search them for specific
strings, packet types, etc. One of the most useful features provided by this utility is an alarm
(Figure A) . The software can alert you whenever certain types of traffic are detected. Such a
feature could go a long way toward improving Wi-Fi security.
Figure A
24

Stop and Wait here******


25

Project 3- Wireless Wizard

http://www.softsea.com/review/Wireless-Wizard.html

or

http://www.softpedia.com/progDownload/Wireless-Wizard-Download-193635.html

Wireless Wizard is a free utility that is designed to help you get the best possible performance
from your wireless network connection. In addition to providing all manner of statistics about
your wireless network, the software offers a series of diagnostic tests you can use to see how
well your wireless network is performing. It also includes a spectrum analyzer that recommends
the best wireless channel for you to use (Figure B) .
Figure B
26
27

Here we (I) have to check the test result that indicate that the connectivity of the company is
not detected; the wizard drive’s results says that wireless profile is not fully recognized. I
tried the suggestion of the software, but the result is the same.
28
29
30

Project 4- D-link Access Point Emulator Setting

2. Use your Web browser to go to the link


http://support.dlink.com/emulators/dap1522/100/ap/bsc_wizard.htm
3. Select Wireless setting, and setup tap. Set up the AP based on standard configuration.

4. Select the advanced setup and apply MAC address filtering to the setup.
31
32

Week 4 Activities

Project 9-1

Step 1: After installation the SMAC displays the NIC adapters that it discovers.

Step 2: The first line with the designated NIC is clicked on and displays the spoofed MAC address below.
33

Step 3: Once the network adapter had been clicked on the up and down arrows next to the Active MAC
address would display a new MAC address.

Step 4: Step 3 would be repeated various types in order to achieve new addresses every time.
34

Step 5: In the final step we clicked on the down arrow under the New Spoofed MAC address to view the
manufacturer associated with this OUI.

Summary

During this exercise we learned how to spoof our own MAC address. This is useful in preventing
unauthorized users from accessing a wireless LAN, MAC address. The SMAC program displayed all
available NICs tied to the network along with their associated manufacturer. The main goal of this was
to repeatedly change the MAC address and to learn how to return it to its original address.
35

9-2 Configuring Aps-Mac Address Filtering

Step 1: After accessing the DAP-1522 AP Mode emulator we entered through past the log in.

Step 2: We clicked on ADVANCED options on the menu. In the MAC filtering setup section we turned on
MAC filtering on and to allow computers listed to access the network.
36

Step 3: After opening command prompt on user computer we typed: ipconfig/all to show us the physical
address. Afterwards we copied the physical address and entered it into the ADD MAC FILTERING RULE
section.

Step 4: After the MAC address had been added we added it and saved the settings. It is important to
note that this emulator the actual MAC address will not be listed under the MAC FILTERING RULES.

Summary

In this exercise we were able to imitate a DAP-1522 device using an emulator through dataling.com. This
emulator is designed to create a secure wireless network to share photos, files, music, video, printers
etc. This is of importance since it can support all of the latest wireless security features to prevent
unauthorized access, whether it be over the wireless network or from the Internet. In this project we
learned how to control the MAC filtering settings and rules to control who can and may not have access
to the network.
37

Project 9-3-Configuring Aps-SSID and WEP Security

Step 1: The importance of using a generic SSID is that it is more convenient for a user to
remember but at times can be costly because it makes it more probable for someone to use it
outside of your network. For “Enable Hidden Wireless” option it is unchecked. If checked would
disable the SSID broadcast. By disabling the broadcast it does not send a broadcast packet to all
device within the LAN.

The default authentication mode implies that the WEP standard will be used. In other
words, the same keys that were inputted into the router and wireless stations will be converted
into hex digits (ASCII values) which will be assigned a value. The most secure use of WEP sets
the authentication type to “Shared Key” when WEP is enabled.
38

Step 3: In this section I changed the WEP key length from 64 bits to 128 bits and the format from “HEX”
to “ASCII”. Next in the WEP Key 1 box I inserted a 13-digit alphamerical code. The purpose of the first
two changes was so that it would make the key a more difficult to access. The longer you make the key
and the change in format from hex to ASCII makes a stronger key.
39

Project 4-3

In this project I used the following link www.grc.com/passwords.htm to generate three passwords.
40

Project 4-4

Summary

In this project we used Technitium MAC Address changer to spoof our Media Access Control address on
our NICs. The program itself had a very easy to use interface and provided basic information regarding
each individual NIC in the machine. It displayed Network connections, MAC addresses, and last status.
Similar to earlier projects this helped to generated addresses in order to make it more difficult for
unauthorized users to access a computers NIC.
41

Week 5 Activities

Step 1: We configured the network simulator to run for 150 secs.

Step 2: Statistics Results Configuration was changed to alter the statistic options. Under available
statistic results we checked off on Throughput (kb/s), Throughput (pkts/s) and Utilization.
42

Step 3: For the physical layer we selected IEEE 802.11 and changed the number of nodes to 25. The data
rate was selected at 1Mb/s.

Step 4: Once all pre operational configuration has been selected the simulation is run until it reaches
completion.
43

Step 5: Once simulation was completed we viewed the results which listed different files that contained
results of the simulation. File throughput_bits.txt was opened to view the results as listed above.

Step 6: File throughput_packets.txt was opened and repeated step 6.


44

Step 7: File Utilization.txt was opened and repeated the same process as step 6.

Step 8: Mean_Values.txt is opened and was saved as 802.11. 1Mbps Mean_Values.txt.


45

Step 9: After the first initial simulation a second simulation was ran of the same network but at 2 Mbps
for 150 seconds. Once the second simulation was finished we opened only the Mean_Values.txt to view
the results and saved it as 802.11 2 Mbps Mean_Values.txt.
46

Project 5-2

Step 1: In this simulation it was relatively similar to the first project but for this simulation we decided to
run the IEEE 802.11g network at 54 Mbps for 150 seconds.

Step 2: After the simulation was ran the files were listed.
47

Step 3: Mean_Values.txt file was viewed and saved as 802.11g 54 Mbps Mean_Values.txt.

Step 4: Once all files have been saved we open Excel and import the file and select it as “Delimited”.
48

Step 5: After the file has been selected as “Delimited” we must choose how the text will be previewed.
The option “Treat consecutive delimiters as one” is selected for all files.

Step 6: Before finally importing the data the following located must be selected. In this case the
following cell open is A1.
49

Step 7: All the files saved from the previous project must follow steps 4 through 6 until they are all listed
periodically on the work sheet. Once this is done the following Utilization (msec) column is examined for
the different standards.

Summary

After looking at the mean values from the previous projects we analyzed that the
utilization is different from each one depending on which network we simulated (e.g. IEEE 802.11g, or a)
and the rate of mbps played a significant role in the results. The first simulation done at 1mbps on IEEE
802.11 standard was vastly different from the the second, third and fourth simulation which had
different node configuration.
50

Case Project 5-2

Mulitplexing is a way of sending mulitple signals or streams of infomation over a

communications link at the same time in the form of a single, complex signal. Its purpose is to enable

signals to be transmitted more efficiently over a given communication channel and thereby decrease

transmission costs. Multiplexing is used in many different situations and for many different devices.

Multiplexing is most commonly used everday when we want to send messages across cities, countries

etc. It is widely used in telecommunication applications including telephony, internet communications,

digital broadcasting and wireless telephony. The receiver recovers the separate signals, a process called

demulitplexing. Networks use mulitplexing for two reason. The first being that it makes it possible for

any network device to talk to any other network device without having to dedicate a connection for

each pair. The second being to make a scarce or expensive resource stretch even farther (e.g. to send

signals down each cable, fiber strand running between metropolitan areas, or across one satellite uplink.

Mulitplexing can offer many different uses such as time division mulitplexing which inputs

signals and is assinged a fixed-length time slot on a communication channel. Frequency Division

Mulitplexing has its signals assigned it own frequency range within a larger frequency band. The ranges

cannot overlap and are often seperated by an usued block of the frequency spectrum to reduce

interference. FDM is mostly used amongst analog transmissions and can be used both wired and

wireless mediums. Code divisoin mulitplexing signals from mulitple senders are transmitted in an

assigned frequency band. These signals are spread out over all frequency channels in the assigned band.

This spreading code modulation increases the bandwidth required for the signal. In turn the receive is

aware of the spreading code and uses it to demultiplex the signal.

In conclusion mulitplexing is efficient and useful since it is only one task in one layer of the Open

Systems Interconnection model, which describes the architecture for enabling data communications

between systems.
51

Week 6 Activities

Project 6-1

Creating a Bootable Linux USB Flash Drive with Network Protocol Analyzer Software

Step 1: Download Unetbottin that will allow us to create a live bootable USB flash drive. In this exercise
Backtrack is already downloaded unto the computer.

Step 2: The following Unetbottin executable file is selected to run on the computer.
52

Step 3: The drive to be used is selected. Drive (E) is selected.

Step 4: The drive is formatted and option “Quick Format” is selected with the following file system and
allocation unit size selected.
53

Step 5: In this step we assured that the Distribution option was selected and that the following
information at the bottom such as Type and Drive were selected in preparation of the transfer over.

Step 6: The version of Linux is selected. In this case BackTrack version is selected along with the 32-bit
version also listed as 5R1-GNOME. By choosing this we do not have to manually place the Linux files bit
by bit.
54

Step 7: For the installation files the disk image button is checked. Next the Diskimage button we browse
until we locate the 32-bit file. Once this is selected we can click OK and commence with the download
unto the flash drive.

Step 7: After the installation is complete the following message shown above will appear and the flash
drive now contains Linux and is ready for use.

Summary

Linux supports monitor mode so that most cards and their drivers can easily display all three types of
frames making it a very useful tool. Since Linux does not require that it be installed on a hard drive it can
be booted from a CD or USB flash drive that contains Linux. This project taught us how to create a USB
flash drive containing Linux and the Backtrack package that contains Wireshark network protocol
analyzer software.
55

Project 6-2

Launch the Linux Wireshark Network Protocol Analyzer

Step 1: Flash drive is inserted into the computer that contains a wireless network interface card adapter.
Computer is rebooted. When the root@slax:~# prompt appears, the following “iwconfig” is entered.

Step 2: When the root@slax: prompt appears we typed “airmon-ng start wlan0” and pressed enter.
56

Step 2 Continued: The following window is a preliminary step prior to start up.

Step 3: Once onto the system we click on the K Menu, click backtrack and information gathering which
will start up Wireshark.
57

Step 4: Interface is clicked on. Start button is clicked on next to the device mon0. Wireshark takes 1-2
minutes to collect frames. Within this time it is important to have someone on the web in order to get
more network traffic.

Step 5: Once the frames have been captured we click File and Save As to save the captured frames to a
data file. In the File name text box we name it as Hernandez Project 6.2.pcap and save it in a designated
folder.

Summary

In this project we learned how to use the Wireshark wireless network protocol analyzer to capture and
display captured frames. WLAN frames were specifically targeted during this assignment and were
chosen to be extracted and saved so if need be can re-examined. This exercise taught us how to reboot
from the installed flash drive that we did in the previous project and how to launch the Linux Wireshark
Network Protocol Analyzer so to capture WLAN frames.
58

Project 6-3

Analyzer WLAN Statistics

Step 1: Wireshark program is started and Statistics is clicked on and then to Summary. The following
summary data about our packet capture is listed above. The total time of packet capture between the
first and last packet is noted. The section noting the Average packets/sec displays the average number
of packets transmitted per second, which is listed at 4.192 packets per second. This value is relatively
high due to it being a WLAN packet, if it were picked from a wired network the value would initially be
smaller.
59

Step 2: Statistics and then Protocol Hierarchy: The percentage of frames that were Management frames
were 91.23 percent compared to Data frames which were at 8.10 percent. The difference is due to the
Management frames are used by wireless stations to join and leave the basic service set. Data frames
carry actual data that is passed down from higher layer protocols. The configuration of the protocol and
Wireshark help choose which layer and frame type you want.

Step 3: Statistics then to IO Graphs: IO Graphs display a graph of the rate at which packets are sent and
received. Tick interval was manually set at 1 sec and the Pixels per tick were set at 5. The graph showed
very low activity due to there being little activity on the network at the time of extraction. What was
noticed about the graph is that it could spike dramatically and offers the user the option of controlling
the tick interval and well as pixels per tick. It allowed different options as well for the unit type so to
customize it in the manner the user wants it.
60

Step 4: Statistics then to WLAN Traffic: The most frequent type of frames transmitted were
authentication and association frames. There was some web surfing on the network in which the
network was trying to allocate resources which in turn were frequently noticed on Wireshark when
sniffing packets.

Step 5: Statistics then to IPv4 Endpoints: We entered into this interface to show the number of packets
send and received (Tx and Rx) by the Aps. We noticed that the different Aps are identified by their
vendor name. Afterwards we closed the window.
61

Step 6: Statistics then to Flow Graph: The flow graph helped show the relationship between the beacon
frames and data frames. The graph helps visualize the flow of traffic in relation to time and direction of
traffic. After the above information was observed we closed the program.
62

Week 7 Activities

Project 10-1

Viewing Security Information with Vistumbler.

We visited the Vistumbler application and expanded the window to full screen. We clicked file and
found the Scan Aps option and clicked that. We started to received feed with various networks available.
Since we conducted this in the library of our campus, we picked up lots of access points all over campus
with some having stronger signal than others.
63

We then looked closer at the options given to us and drilled down on Authentication to find two other
drop down menus classified WPA2-Enterprose and Open. We concluded that the more secure option is
the WPA2-Enterprise and the least secure are the Open. We were able to detect approximately 106
different AP. We then expanded the Encryption tab and found that the options to continue drilling down
were CCMP and None. We concluded that CCMP was the more secure option. A hacker could use this
information to find the easiest access point available to his, the access point that has the least security.
We found 31 different AP under the encryption section and 28 under the Authentication.
64

Project 10-2

Configuring Access Points-WPA2 and WPS

For this next assignment we went to D-Link.com and looked up the Emulator, specifically DAP-1522.
When we could locate it we then were taken to another page for a log in. We continued without
imputing a password and proceeded through the website.
65

When we reached this page we looked under Manuel Wireless network setup and clicked that option.
We then were taken further into the setup where we saw the options under the WPA. They included
Disable Wireless security, WEP, WPA-personal and WPA-Enterprise and we concluded that you would
use WPA2 when you have a faster computer than can run the algorithms and decryption of keys. The
next task was to look at the Cipher type and the options were either TKIP and AES. We conferred and
AES is the best option as the TKIP is not secure anymore and can be cracked without a problem. Only if
you have a modern computer you can access this.

We then proceeded to the next webpage https://www.grc.com/passwords.htm where we found a


password suitable for our security. We then copied and pasted in the passphrase portion.
66

We proceeded to click security mode and changed the drop down to WPA-Enterprise which then
requested new information regarding the EAP. Because it is for an enterprise and many are going to be
using the Wi-Fi, there needs to be added security. That is why the Wi-Fi protected setup was enabled
automatically.
67

Project 10-3

Use SSH Application

We downloaded PuTTY for accessing our email via a secured connection. The website was
www.putty.org

It then lead us to this page where we proceeded to download the program. Once installed we ran the
program and proceeded to follow the steps mentioned.
68

For this step, we typed in our Host name for our email server and in our case it was
smtp.mail.yahoo.com. We used the port 22 for the email connection. This is the port where all the
information is received and sent from.

We expanded the tunnels portion and included a new port for our emails to go through, 110. We also
entered the address for our port to allow to communicate with us which is smtp.mail.yahoo.com

We saved out changes and proceeded to connect to our email. The black box that you see here is the
authentication process that is used for our email. With this, our session is over.
69

Case Project 10

Firesheep

Firesheep is an extension of Firefox. It has the capabilities of using a packet sniffer to capture

login information from social media websites such as Facebook and Twitter. The extension can easily

mimic the login password and gain entry through what are known as Secured Socket Layering (SSL). The

concept of firesheep is so simple that the hacker doesn’t need any programming experience. In a

specific attack known as side jacking, the hacker uses an unencrypted Wi-Fi connection to gain access to

your packets. The program will sniff out specific logins from social media accounts by acquiring the

cookies that are linked to your login.

A simple fix is to access pages that are already protected with SSL. More importantly, the whole

website must be protected with this software. Having only the login page protected and not the

remainder of the session can be cause for concern. You should always be aware when using an

unencrypted Wi-Fi connection as this is the easiest means of having someone see your network traffic. A

simple packet sniffer can be used to do this and in this case with the firesheep, it not only sees your

packets but also records a user login.

To give you a good description of just how easy it is to use this technology and hack into

someone else’s social media. First, we begin with extension that Firefox has allowed to have on the

browser. Once the option is clicked on the program will open a side window and say it is capturing

packets. Now, the only information that the firesheep can access are the social media accounts. When it

does notice that one has been accessed, it does just that and captures the cookies that are being

created by the social media accounts. A button with the person’s name that has been recorded now

appears on your screen and you can click the account to gain entry in immediate page following the

login.
70

Week 9 Activity.

Lab Solution

NetStumbler and Nmap

We started the Lab by downloading the required software. We went on http://www.netstumbler.com/


and found the proper download for the NetStumbler. We could find various access points spread out
amongst the school. The application was very simple to use, in fact we all had an opportunity to click
various options and sift through data by re-arranging by tab.
71

The various tabs we were able to use included MAC, SSID, Name, Channel, Speed, Vendor
(Manufacturer), Type, Encryption, Signal-to-noise ration (SNR), Signal Level, Noise Level, IP Address,
Subnet, Latitude, Longitude, First Seen, Last Seen, Flags, Beacon Interval and Distance. We were able to
find several access points with NMAP.

We went ahead and opened the Command Prompted in order to conduct our nex excecution of the
program in order to find another access point. We typed in nmap -sP -v your_network_address and
the following information was available to us. This showed us similar results.
72

We then proceeded to follow the steps to find more information out and therefore, we typed in
the following in our command prompt. nmap -sS -A target_IP_address. The information was not
displayed as it was in the first attempt. We suspect that the proper tools were not enabled at the
time of installation. That is why we received the missing IP address message you see above.

We went back to using the NetStumbler in order to


access the appropriate connectivity points. In the end, we found the GUI version of the access point
detection software to be the better of the two. We found using the command line was more
complicated and less efficient,
73

Week 10 Activity

Mobil Edit

This lab was done in class as the computers in our classroom are set up with this software. We
conducted this in a group setting with my phone a Samsung Note Edge. 2.7GHz quad-core Qualcomm
Snapdragon 805 processor and it comes with 3GB of RAM. We proceeded to connect the phone to the
computer via a cable to the USB port. The phone was placed in Developer mode in order to access all
files.
74

The phone software began to downloand all the data and this took us approximately 20 mins to fully
archive. After this was conducted, we were able to view everything from messages to emails. We
browsed through the pictures and decided to export the following messages.

We then extracted our information via excel which we will have print screens of such data below. This
was a very useful software which allowed us to dissect a target phone with ease. The software for
MobilEdit is easy to use for any person with no experience. The ability to extract into various extensions
makes this a easy to interact with software.
75

Week 11 Activity

Project 1 Net Surveyor

Once Net Surveyor is installed you are immediately brought to the channel usage screen with constant
network scans. Other tabs include Channel time course, heatmap, spectrogram, AP time course, and AP
differential.

To create a report we went to file, create report and were given the report in pdf. The following was
given to us in the report.
76
77
78
79

Project 2 Wi-Fi Hopper

Discovery and Site Survey tool With a Connection Manager

We used Wi-Fi Hopper to find unsecured wireless networks in the area. It provided us with details
regarding the network setup and provided quick access to network speeds.
80
81

Project 3 Mobile IP 1 Page Paper

Mobile IP allows a change of attachment to the internet without needing to change the IP

address. The way it works is that protocol extensions involve packets at a mobile host and are sent to a

its home network as if it were not mobile. It is then passed through static node known as the home

agent. From there the mobile host registers its real location with the home agent, thus ensuring that the

packets are forwarded to the host. Typically, is the mobile host is at home then forwarding would be

plain and simple, but if the mobile host is roving, then the packets must be tunneled throughout the

internet to a carefully addressed receiver or end of the tunnel through a foreign agent.

Although mobile IP can be used to solve any type of IP mobility issue, it is best used as a link

layer within WLANs and mobile devices. Another alternative to tunneling might be source routing

within the IP. IPv6 offers the alternatives to tunneling for mobile IP. It can use routing extension header

which the mobile node can establish communications with the home agent and use that information to

directly route the packets to its proper destination.

Specific changes to the protocol are needed to let the mobile node register with a home agent

or a remote foreign agent. In addition, when a mobile node is linked with a foreign agent, another

process with the home agent is initiated to redirect traffic to aid the care of address destination. Foreign

agents may also display their potential so that mobile nodes that connect to them know that

registration for mobile IP is an option.

A mobile node tells its home agent about its care of address with a registration procedure. This

is constructed as a new small protocol that utilizes UDP. UDP serves as its transport. The port number

434 is saved for agents to listen for incoming registration from mobile devices.

Source: Mobile IP networks: An overview


http://searchunifiedcommunications.techtarget.com/feature/Mobile-IP-networks-An-overview
82

Project 4

Meraki

Meraki Wi-Fi Stumbler required a quick profile setup to use the demo which brought us to the following
page.

From here you can go under network wide to view clients, packet capture, event log, and summary
report as shown below.
83
84

Week 12 Activity

Project 1 LockNote Steganos

Once Locknote is downloaded select Locknote.exe.

We deleted all of the text to put in our own text that could only be accessed through a password.

We entered our selected password to access the file.


85

We learned that this was a simple and quick program that allowed us to quickly encrypt files. It
was user friendly so that it could be taught to anyone that wants to use this program.
86

Project 2 AXCRYPT

Created an Axcrypt account with a Toro mail account.

Selected a file to protect. Right click the file and select encrypt.

It will ask for a password to access.

Right click again to decrypt the file

Potrebbero piacerti anche