1 / 14

HIT8071 Professional Project

HIT8071 Professional Project. Detecting Rogue Access Points. by. Team Net+Worth. Client : Dr. Philip Branch. Project Supervisor : Mr. Graham Farrell. Team Members Asiri Rajapakse 6570534 Prasad Chitraju 6596207 Prashanth Phutane 655623X Roger De Couto 6554873

pier
Télécharger la présentation

HIT8071 Professional Project

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HIT8071 Professional Project Detecting Rogue Access Points by Team Net+Worth Client : Dr. Philip Branch Project Supervisor : Mr. Graham Farrell

  2. Team Members AsiriRajapakse 6570534 Prasad Chitraju 6596207 PrashanthPhutane 655623X Roger De Couto 6554873 ShrisharanRamachandran 6584608

  3. Outline • Introduction • Wireless Networks and Rogue Access Point’s. • Methods available to Detect Rogue Access Point’s • Rogue Buster integrated with Kismet • Conclusion

  4. Introduction Goals: • To address one of the most well known challenges to wireless networks known as “Rogue Access Points”. • Provide an effective solution for identifying these rogue devices. • Solution- wireless sniffing tool. Objectives: • Analyse the use of wireless sniffing tools to detect rogue access points. • Building a viable solution for detecting rogue access points.

  5. Why implement wireless? Its Comparatively : Cheap Easy Flexible Convenient for users

  6. Rogue AP’s? Unauthorised Access Point

  7. Available Wireless Scanners • Netstumbler • Nessus • Kismet

  8. Why Kismet ? OTHERS Vs. • Passive (No detectable packets) • Undetectable • Saves output in different formats . (Ex: .csv, .xml and .txt) • Detectable (Due to active scanning) • Output in different formats (no .csv) • Rogue access point detection method(Blocked by firewalls)

  9. How does Kismet work ? Server Server Access Point Client Monitor Mode Local Host

  10. Rogue Buster Development phases

  11. How Rogue Buster works?

  12. Why should you use Rogue Buster? • High Accuracy. • Free software(for now!). • Can be run on any laptop which has a wireless card. • Database of Legitimate Access Points can be used as tracker. • Multi task with ease!

  13. Conclusion • Reliable, Efficient…It “Simply” Works!!! • Kismet Wireless Scanner • Who and Why use it

  14. Questions

More Related