1 / 10

Group 4 Autonomous Wi-Fi Sniffer RC Truck ‘GIZMO’

Group 4 Autonomous Wi-Fi Sniffer RC Truck ‘GIZMO’. Sponsor CALIT2 Mentors Javier Rodriguez Molina Don Kimball Group Members Dan Curcio Anson Hsu. Agenda. Gantt Chart Tasks Performed (week 5) Technical Content NMEA data parser Client IP vs. MAC spoofing

tivona
Télécharger la présentation

Group 4 Autonomous Wi-Fi Sniffer RC Truck ‘GIZMO’

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Group 4 Autonomous Wi-Fi Sniffer RC Truck ‘GIZMO’ Sponsor CALIT2 Mentors Javier Rodriguez Molina Don Kimball Group Members Dan Curcio Anson Hsu

  2. Agenda • Gantt Chart • Tasks Performed (week 5) • Technical Content • NMEA data parser • Client IP vs. MAC spoofing • Kismet and Wireless Network Overview • Goals for Next Week • Questions and Feedback

  3. Gantt Chart

  4. Accomplishments this Week • Acquired support hardware (crossover cables) • Modified GPS interface code (Anson) • Planned meeting with software support (Anson) • Upgraded wireless card hardware on development PC (Dan) • Reviewed Kismet documentation (Dan) • Researched/discussed client detection options (Both)

  5. NMEA Data parser • Essential data • Latitude (green) • Longitude (blue) • Timestamp (gray) • String markers (red), if not found, returns error • Measurements status (red) • If A(ctive), get data, if V(oid), try/catch/error block • Takes input from GPS unit as string, uses string index as markers for information-grabbing

  6. Client Detection Options • Active methods • IP/MAC address spoofing • Pose as access point IP and measure incoming packets • Problematic due to wireless mesh architecture / idle users • Passive methods • Measure all network activity. Packet origins and destinations (not IP specific) • Disruptive methods • Reboot the network, force everyone in vicinity to actively reconnect

  7. How Do Wireless Clients and APs Differ? • A typical Wi-Fi setup contains one or more Access Points (APs) and one or more clients. • However, wireless networks can also be construced with no central access point • Called Ad-Hoc or Peer-to-Peer networking • This is typical of a mesh network • Detecting other clients is the biggest challenge in our implementation.

  8. Kismet Software Overview • Kismet offers a solution to our client detection problem. • Kismet is an open source wireless network detector, sniffer, and intrusion detection system. • It works by examining packets that are being transmitted. • Correction: It is unique in that it is able to detect the presence of both wireless access points and wireless clients, and associate them to each other.

  9. Kismet Software – Screen Shot Image courtesy Kismet.com

  10. Goals for Next Week • Develop GPS code for error handling • Begin development of web interface • Further develop Kismet+client software • Adapt Kismet code to the Gizmo application

More Related