I am a relative newbie to WLAN and I need a bit of guidance.
I need to make a proposal for WLAN security testing to my thesis tutor.
I am thinking of creating a very small test pad, i.e. 1 AP, 2 Clients and 1 Unauthorised client. I am hoping to produce some test data to show how the hacker can access the network with no security, with WEP on and how hackers can be picked up with extra security features, and indeed total prevention.
But I am not sure what I need to set up this test pad. Or the software I need to produce the tests. Does anyone have some ideas or tips for me to look at?
Firstly is my setup correct, is it enough?
Which hacking programs are the best/most recent? Airsnort?
Which WLAN management software is best for this? I was thinking of using Airopeek?
This isn't anything illegal by the way, I am a student at the University of Derby, England.
I believe your setup will suffice to demonstrate Wireless security (or lack of security). You may also want to look at some VPN solutions, or using a traditional firewall (or combination of firewall / VPN).
The new generation of Wireless products from several vendors are now including propritery supplemental security - and newer standards-based security solutions. It may be worth a look to compare this newer generation of security enhancements to the existing WI-FI / WEP.
BTW: "Illegal" can be a pretty subjective term, depending on your location. Some interpretations of US Law would make your demonstration illegal (though not likely to be enforced).
The only recommendations I can make to you is that you need to define the standard 802.1? ? you would like to use, because there are different scenarios and problems you will be facing with each one of them. If the scope of your project is limited to just a small test you will be fine with 1 AP and 3 clients. But if you would like to test a more complicated scenario involve authentication servers, rogue access points, include digital certificates and MAC access control.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :