Kismet Hacking.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Kismet Hacking.Pdf Contributing Authors Brad ‘RenderMan’ Haines is one of the more visible and vocal members of the wardriving community, appearing in various media outlets and speak- ing at conferences several times a year. Render is usually near by on any wardriving and wireless security news, often causing it himself. His skills have been learned in the trenches working for various IT companies as well as his involvement through the years with the hacking community, sometimes to the attention of carious Canadian and American intelligence agencies. A firm believer in the hacker ethos and promoting responsible hacking and sharing of ideas, he wrote the ‘Stumbler ethic’ for beginning wardrivers and greatly enjoys speaking at corporate conferences to dissuade the negative image of hackers and wardrivers. His work frequently borders on the absurd as his approach is usually one of ignoring conventional logic and just doing it. He can be found in Edmonton, Alberta, Canada, probably taking something apart. Michael J. Schearer is an active-duty Naval Flight Officer and Electronic Countermeasures Officer with the U.S. Navy. He flew combat missions during Operations Enduring Freedom, Southern Watch, and Iraqi Freedom. He later took his electronic warfare specialty to Iraq, where he embedded on the ground with Army units to lead the counter-IED fight. He currently serves as an instructor of Naval Science at the Pennsylvania State University Naval Reserve Officer Training Corps Unit, University Park, PA. Michael is an active member of the Church of WiFi and has spoken at Shmoocon, DEFCON, and Penn State’s Security Day, as well as other forums. His work has been cited in Forbes, InfoWorld and Wired. Michael is an alumnus of Bloomsburg University where he studied Political Science and Georgetown University where he obtained his degree in National Security Studies. While at Penn State, he is actively involved in IT issues. He is a licensed amateur radio operator, moderator of the Church of WiFi and Remote-Exploit Forums, and a regular on the DEFCON and NetStumbler forums. v Frank Thornton runs his own technology consulting firm, Blackthorn Systems, which specializes in wireless networks. His specialties include wireless network architecture, design, and implementation, as well as network troubleshooting and optimization. An interest in amateur radio helped him bridge the gap between computers and wireless networks. Having learned at a young age which end of the soldering iron was hot, he has even been known to repair hardware on occasion. In addition to his computer and wireless interests, Frank was a law enforcement officer for many years. As a detective and forensics expert he has investigated approximately one hundred homicides and thousands of other crime scenes. Combining both professional interests, he was a member of the workgroup that established ANSI Standard “ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information.” He co-au- thored RFID Security (Syngress Publishing, ISBN: 1597490474), WarDriv- ing: Drive, Detect, and Defend: A Guide to Wireless Security (Syngress, ISBN: 193183603), as well as contributed to IT Ethics Handbook: Right and Wrong for IT Professionals (Syngress, ISBN: 1931836140) and Game Console Hack- ing: Xbox, PlayStation, Nintendo, Atari, & Gamepark 32 (ISBN: 1931836310). He resides in Vermont with his wife. vi Chapter 1 Introduction to Wireless Networking, Wardriving, and Kismet Solutions in this chapter ■ Exploring Past Discoveries That Led to Wireless ■ Exploring Present Applications for Wireless ■ Introduction to Wardriving ■ Introduction to Wardriving with Linux ■ Wardriving with Linux and Kismet ˛ Summary Chapter 1 • Introduction to Wireless Networking, Wardriving, and Kismet Exploring Past Discoveries That Led to Wireless Wireless technology is the method of delivering data from one point to another without using physical wires, and includes radio, cellular, infrared, and satellite. A historic perspective will provide you with a general understanding of the substantial evolution that has taken place in this area. The common wireless networks of today originated from many evolutionary stages of wireless communications and telegraph and radio applications. Although some discoveries occurred in the early 1800s, much of the evolution of wireless communication began with the emergence of the electrical age and was affected by modern economics as much as by discoveries in physics. Because the current demand of wireless technology is a direct outgrowth of traditional wired 10-Base-T Ethernet networks, we will also briefly cover the advent of the computer and the evolution of computer networks. Physical networks, and their limitations, significantly impacted wireless technology. This section presents some of the aspects of traditional computer networks and how they relate to wireless networks. Another significant impact to wireless is the invention of the cell phone. This section will briefly explain significant strides in the area of cellular communication. Discovering Electromagnetism Early writings show that people were aware of magnetism for several centuries before the middle 1600s; however, people did not become aware of the correlation between magnetism and electricity until the 1800s. In 1820, Hans Christian Oersted, a Danish physicist and philosopher working at that time as a professor at the University of Copenhagen, attached a wire to a battery during a lecture; coincidentally, he just happened to do this near a compass and he noticed that the compass needle swung around. This is how he discovered that there was a relationship between electricity and magnetism. Oersted continued to explore this relationship, influencing the works of contemporaries Michael Faraday and Joseph Henry. Michael Faraday, an English scientific lecturer and scholar, was engrossed in magnets and magnetic effects. In 1831, Michael Faraday theorized that a changing magnetic field is necessary to induce a current in a nearby circuit. This theory is actually the definition of induction. To test his theory, he made a coil by wrapping a paper cylinder with wire. He connected the coil to a device called a galvanometer, and then moved a magnet back and forth inside the cylinder. When the magnet was www.syngress.com Introduction to Wireless Networking, Wardriving, and Kismet • Chapter 1 moved, the galvanometer needle moved, indicating that a current was induced in the coil. This proved that you must have a moving magnetic field for electromagnetic induction to occur. During this experiment, Faraday had not only discovered induc- tion but also had created the world’s first electric generator. Faraday’s initial findings still serve as the basis of modern electromagnetic technology. Around the same time that Faraday worked with electromagnetism, an American professor named Joseph Henry became the first person to transmit a practical electri- cal signal. As a watchmaker, he constructed batteries and experimented with magnets. Henry was the first to wind insulated wires around an iron core to make electromag- nets. Henry worked on a theory known as self-inductance, the inertial characteristic of an electric current. If a current is flowing, it is kept flowing by the property of self- inductance. Henry found that the property of self-inductance is affected by how the circuit is configured, especially by the coiling of wire. Part of his experimentation involved simple signaling. It turns out that Henry had also derived many of the same conclusions that Faraday had. Though Faraday won the race to publish those findings, Henry still is remembered for actually finding a way to communicate with electromagnetic waves. Although Henry never developed his work on electrical signaling on his own, he did help a man by the name of Samuel Morse. In 1832, Morse read about Faraday’s findings regarding inductance, which inspired him to develop his ideas about an emerging technology called the telegraph. Henry actually helped Morse construct a repeater that allowed telegraphy to span long distances, eventually making his Morse Code a worldwide language in which to communicate. Morse introduced the repeater technology with his 1838 patent for a Morse Code telegraph. Like so many great inventions, the telegraph revolutionized the communications world by replacing nearly every other means of communication—including services such as the Pony Express. Exploring Conduction Samuel Morse spent a fair amount of time working on wireless technology, but he also chose to use mediums such as earth and water to pass signals. In 1842, he performed a spectacular demonstration for the public in which he attempted to pass electric current through a cable that was underwater. The ultimate result of the demonstration was wireless communication by conduction, although it was not what he first intended. Morse submerged a mile of insulated cable between Governor’s Island and Castle Garden in New York to prove that a current could pass through wire laid in water. He transmitted a few characters successfully, but, much to his dismay, the communication suddenly www.syngress.com Chapter 1 • Introduction to Wireless Networking, Wardriving, and Kismet halted—sailors on a ship between the islands, unseen to the spectators, raised their ship’s anchor and accidentally pulled up the cable, and not knowing what it was for, proceeded to cut it. Morse faced considerable heckling from the spectators and immediately began modification to the experiment. He successfully retested his
Recommended publications
  • Creating a Mesh Sensor Network Using Raspberry Pi and Xbee Radio Modules
    Creating a mesh sensor network using Raspberry Pi and XBee radio modules By Michael Forcella In Partial Fulfillment of the Requirement for the Degree of MASTER OF SCIENCE In The Department of Computer Science State University of New York New Paltz, NY 12561 May 2017 Creating a mesh sensor network using Raspberry Pi and XBee radio modules Michael Forcella State University of New York at New Paltz _________________________________ We the thesis committee for the above candidate for the Master of Science degree, hereby recommend acceptance of this thesis. ______________________________________ David Richardson, Thesis Advisor Department of Biology, SUNY New Paltz ______________________________________ Chirakkal Easwaran, Thesis Committee Member Department of Computer Science, SUNY New Paltz ______________________________________ Hanh Pham, Thesis Committee Member Department of Computer Science, SUNY New Paltz Approved on __________________ Submitted in partial fulfillment for the requirements for the Master of Science degree in Computer Science at the State University of New York at New Paltz ABSTRACT A mesh network is a type of network topology in which one or more nodes are capable of relaying data within the network. The data is relayed by the router nodes, which send the messages via one or more 'hops' until it reaches its intended destination. Mesh networks can be applied in situations where the structure or shape of the network does not permit every node to be within range of its final destination. One such application is that of environmental sensing. When creating a large network of sensors, however, we are often limited by the cost of such sensors. This thesis presents a low-cost mesh network framework, to which any number of different sensors can be attached.
    [Show full text]
  • Major Project Final
    2015 PiFi Analyser MASON MCCALLUM, NATHAN VAZ AND TIMOTHY LY NORTHERN SYDNEY INSTITUTE | Meadowbank Executive summary Wireless networks have become more prevalent in contemporary society, as such it is important to accurately study the impact that wireless networking can have on personal security and privacy. The PiFi Analyser project outlines the methods behind passively recording wireless networks and mapping the recorded data with associated GPS location data. The ensuing report confirms the methodologies and technologies proposed can operate to scopes that could be used to significant effect. 1 | P a g e Contents Executive summary ................................................................................................................................. 1 Introduction ............................................................................................................................................ 4 Literature Review .................................................................................................................................... 5 Objectives ............................................................................................................................................... 7 Method ................................................................................................................................................... 9 Building the Device ............................................................................................................................. 9 Testing device
    [Show full text]
  • LAB 13: Wifi Security PA197
    LAB 13: WiFi security PA197 Sven Relovsk´y,Patrik Rehuˇs,Michal Snajdrˇ [email protected] Sven Relovsk´y,Patrik Rehuˇs,Michal Snajdrˇ [email protected] LAB 13: WiFi security Warning All of the advice/information that I'll give is purely for educational pur- poses. MU will not be responsible for any illegal use of this tutorial. Don't hack any wireless network, unless you are the owner of that network. Sven Relovsk´y,Patrik Rehuˇs,Michal Snajdrˇ [email protected] LAB 13: WiFi security We will try... Wifi security - vulnerabilities I Hidden SSID I MAC filtering I Weaknesses in WEP encryption I Security vs. Comfort (Is WPS secure?) I WPA/WPA2 capture handshake I Homework: WPA2 attacks KISMET tool I Detection of attacker's/fake access points Sven Relovsk´y,Patrik Rehuˇs,Michal Snajdrˇ [email protected] LAB 13: WiFi security Lab prerequisities 1. Hardware I laptop with a WiFi module (must support monitor mode) 2. Software I specialised Linux distro Kali Linux - All-In-One solution I airmon-ng { a bash script designed to turn wireless cards into monitor mode I airodump-ng { a packet capture tool for aircrack-ng I aireplay-ng { inject ARP-request packets into a wireless network to generate traffic I aircrack-ng { a 802.11 WEP / WPA-PSK key cracker I wash { utility for identifying WPS enabled points I reaver with Pixie { modified version - exploits a security hole in wireless routers I kismet { network detector, packet sniffer, and intrusion detection system for 802.11 wireless LANs Sven Relovsk´y,Patrik Rehuˇs,Michal Snajdrˇ [email protected] LAB 13: WiFi security Why is WiFi security so important? I WiFi connection is very popular (flexible, comfortable, cheap) I number of devices is rapidly increasing due to Internet of Things (IoT) I we transfer sensitive data Vulnerabilities I connect to devices in network (capture webcam, access to shared network storage, control intelligent things - heating, light .
    [Show full text]
  • Comparison of Wireless Network Penetration Testing Tools on Desktops and Raspberry Pi Platforms
    Comparison of Wireless Network Penetration Testing Tools on Desktops and Raspberry Pi Platforms Aparicio Carranza, PhD1, Daniel Mayorga, BTech1, Casimer DeCusatis, PhD2 and Hossein Rahemi, PhD3 1New York City College of Technology - CUNY, Brooklyn, NY USA, [email protected] 2Marist College, Poughkeepsie, NY USA, [email protected] 3Vaughn College of Aeronautics & Technology, East Elmhurst, NY USA, [email protected] Abstract– Wireless networks have become ubiquitous due to their transparent mode to capture packets in the 2.4 GHz band from ease of use and facilitation of mobile devices such as smart phones, a Netgear router [6]. We set up a WLAN for testing using a tablets, and various Internet of Things (IoT) applications. This has standard commercial dual band Cisco wireless router; driven a need for more advanced wireless penetration testing although our testing was conducted in the 2.4 GHz band, this techniques, and for more technical professionals trained in wireless work should be readily extensible to the 5 GHz band. Our security. In this paper, we investigate three popular open source wireless penetration testing tools (Aircrack –ng, Reaver, and Kismet) wireless router supports Wi-Fi Protected Setup (WPS) for and compare their behavior on a traditional desktop computer and testing with Reaver, and configuration options for WEP, a Raspberry Pi model 3. Use cases include packet sniffing and WPA, and WPA2 encryption [7-10]. While we recognize that decryption of WEP, WPA, and WPA2 passwords. Based on this WPS contains a known vulnerability and is not recommended work, we make recommendations for using specific tools in for sensitive applications, and that likewise WEP and WPA cybersecurity training and education.
    [Show full text]
  • Server / Drone / Client Infrastructure[Edit] Kismet for Mac Keyboard
    Kismet For Mac Developer(s) Mike Kershaw (dragorn) Stable release 2020-04-R3[1] / May 2, 2020; 5 months ago Repository Written in C++ Operating system Cross-platform Type Packet Sniffer License GPL Website www.kismetwireless.net 1. Kismet For Mac Keyboard 2. Kismet For Mac Download 3. Kismet For Mac Os 4. Kismet For Mac Kismet is a network detector, packet sniffer, and intrusion detection system for 802.11wireless LANs. Kismet will work with any wireless card which supports raw monitoring mode, and can sniff 802.11a, 802.11b, 802.11g, and 802.11n traffic. The program runs under Linux, FreeBSD, NetBSD, OpenBSD, and Mac OS X. The client can also run on Microsoft Windows, although, aside from external drones (see below), there's only one supported wireless hardware available as packet source. Distributed under the GNU General Public License,[2] Kismet is free software. Features[edit] Traditional Lipsticks, Liquid Lipsticks, Matte Lipsticks, Lip Plumping Glosses, Lip Liners and More! Showing 1–21 of 70 results. Rated 5.00 out of 5. CEO Semi-Matte Lipstick $ 18.00 Add to cart. Yours Truly Semi-Matte Lipstick $ 18.00 Add to cart. Sweetie Semi- Matte Lipstick. Two files stored in the /etc/kismet directory called 'apmanuf' and 'clientmanuf' are used to help Kismet determine the types and manufacturers of AP or wireless clients based on MAC. KisMAC is an open-source and free sniffer/scanner application for Mac OS X. It has an advantage over MacStumbler / iStumbler / NetStumbler in that it uses monitor mode and passive scanning. Kismet differs from other wireless network detectors in working passively.
    [Show full text]
  • GPSD Client HOWTO
    7/16/2017 GPSD Client HOWTO GPSD Client HOWTO Eric S. Raymond <[email protected]> version 1.19, Jul 2015 Table of Contents Introduction Sensor behavior matters What GPSD does, and what it cannot do How the GPSD wire protocol works Interfacing from the client side The sockets interface Shared-memory interface D-Bus broadcasts C Examples C++ examples Python examples Other Client Bindings Java Perl Backward Incompatibility and Future Changes Introduction This document is a guide to interfacing client applications with GPSD. It surveys the available bindings and their use cases. It also explains some sharp edges in the client API which, unfortunately, are fundamental results of the way GPS sensor devices operate, and suggests tactics for avoiding being cut. Sensor behavior matters GPSD handles two main kinds of sensors: GPS receivers and AIS receivers. It has rudimentary support for some other kinds of specialized geolocation-related sensors as well, notably compass and yaw/pitch/roll, but those sensors are usually combined with GPS/AIS receivers and behave like them. In an ideal world, GPS/AIS sensors would be oracles that you could poll at any time to get clean data. But despite the existence of some vendor-specific query and control strings on some devices, a GPS/AIS sensor is not a synchronous device you can query for specified data and count on getting a response back from in a fixed period of time. It gets radio data on its own schedule (usually once per second for a GPS), and emits the reports it feels like reporting asynchronously with variable lag during the following second.
    [Show full text]
  • Exploring Open Source Wireless Tools by Jake Snyder (The Dread Pirate Roberts) @Jsnyder81 Who Am I?
    Exploring Open Source Wireless Tools By Jake Snyder (The Dread Pirate Roberts) @jsnyder81 Who am I? • Wireless Engineer at CompuNet Inc • CCIE-W #43153 • CWNE #161 • Security Enthusiast • Linux hobbiest • Wireless Field Day Delegate (http://techfieldday.com/event/wfd8/) • Blogger • Maker What does a set of professional tools cost? What I use at work: Ekahau ESS: $4000 Omnipeek: $2500 Chanalyzer + WiSpy: $1250 Aircheck: $2000 *All prices are approximates Professional tools in my first year. • Airmagnet Survey pro • Yup, that was it. http://www.popsugar.com/entertainment/Princess-Bride-Quotes-35919789#photo-35919789 “I mean, if we only had a wheelbarrow, that would be something.” -Westley Sometimes you have to build a wheelbarrow • Linux VM • Proxim 8494 • Airmon-NG • Wireshark “Well, why didn’t you list that among our assets in the first place” -Westley All these tools… Why Open Source? Pros: Cons: • Low Cost • Free if your time is worth • Flexibility nothing • Lots of available tools • Pieces of a solution, you have to put it together • Low barrier to entry • Requires knowledge • Time = investment “Please consider opensource as an alternative to suicide.” – Prince Humperdink What are my hobbiest opensource costs? Options for todays presentation: Raspberry PI: $223 Intel NUC $436 Raspberry PI 2B $38 NUC5CPYH: $134.00 ASUS USB-N53 $45 8G Memory: $34 Micro SD Card: $15 SSD: $40 Case: $5 Intel 7265 $28 Ubertooth: $120 WiSpy 2.4Ghz: $200 Existing Laptop: $8 • USB stick to boot linux • The chocolate coating makes it go down easier • VM is an option, albeit not a good one My Preferred Wireless Adapters • Asus USB-N53 • Intel 726x • 802.11n • 802.11ac • 2x2:2 • 2x2:2 • USB 2.0 • Mini PCIe half height and m.2 • Ralink RT3572 using RT2800 Driver • Intel IWLWIFI: Non-Free firmware • Works on Raspberry PI required • $45 on Amazon • $27 on amazon • Has issues with Deauth/Dissassoc • Lots of clients using them packets not being passed to host.
    [Show full text]
  • OS-Based Resource Accounting for Asynchronous Resource Use in Mobile Systems
    OS-based Resource Accounting for Asynchronous Resource Use in Mobile Systems Farshad Ghanei Pranav Tipnis Kyle Marcus [email protected] [email protected] [email protected] Karthik Dantu Steve Ko Lukasz Ziarek [email protected] [email protected] [email protected] Computer Science and Engineering University at Buffalo, State University of New York Buffalo, NY 14260-2500 ABSTRACT In the last two decades, computing has moved from desk- One essential functionality of a modern operating system tops to mobile and embedded platforms. Advances in sens- is to accurately account for the resource usage of the un- ing, communication, and estimation algorithms have led to derlying hardware. This is especially important for com- the development of advanced robotic systems such as driver- puting systems that operate on battery power, since energy less cars and micro-aerial vehicles. Networks of sensors re- management requires accurately attributing resource uses to side in buildings as well as outdoor areas to monitor and processes. However, components such as sensors, actuators improve our daily lives. Since such use cases rely on hard- and specialized network interfaces are often used in an asyn- ware that is battery powered, energy constraints lie at the chronous fashion, and makes it difficult to conduct accurate heart of this evolution [16]. resource accounting. For example, a process that makes a Energy is a finite, system-wide resource that needs to be request to a sensor may not be running on the processor for efficiently managed across all applications. One requirement the full duration of the resource usage; and current mech- for this, is the ability to account energy usage for each ap- anisms of resource accounting fail to provide accurate ac- plication.
    [Show full text]
  • Online Monitoring Using Kismet
    San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2012 ONLINE MONITORING USING KISMET Sumit Kumar San Jose State University Follow this and additional works at: https://scholarworks.sjsu.edu/etd_projects Part of the Computer Sciences Commons Recommended Citation Kumar, Sumit, "ONLINE MONITORING USING KISMET" (2012). Master's Projects. 243. DOI: https://doi.org/10.31979/etd.rexc-dkr7 https://scholarworks.sjsu.edu/etd_projects/243 This Master's Project is brought to you for free and open access by the Master's Theses and Graduate Research at SJSU ScholarWorks. It has been accepted for inclusion in Master's Projects by an authorized administrator of SJSU ScholarWorks. For more information, please contact [email protected]. ONLINE MONITORING USING KISMET A Project Presented to The Faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements for the Degree Master of Science by Sumit Kumar May 2012 c 2012 Sumit Kumar ALL RIGHTS RESERVED The Designated Project Committee Approves the Project Titled ONLINE MONITORING USING KISMET by Sumit Kumar APPROVED FOR THE DEPARTMENTS OF COMPUTER SCIENCE SAN JOSE STATE UNIVERSITY May 2012 Dr. Mark Stamp Department of Computer Science Dr. Chris Pollett Department of Computer Science Dr. Cay Horstmann Department of Computer Science ABSTRACT Online Monitoring using Kismet by Sumit Kumar Colleges and universities currently use online exams for student evaluation. Stu- dents can take assigned exams using their laptop computers and email their results to their instructor; this process makes testing more efficient and convenient for both students and faculty.
    [Show full text]
  • Python Gps2system. 2/25/2017
    Python GPS2system. 2/25/2017 Overview The GPS system was designed to play audio clips along the route of the New Hope Valley Railroad. The initial impedes was to play sound effects during the Halloween train rides. At a specified latitude and longitude the device would play a specific sound effect. After the system is powered up, it may take the GPS receiver a couple of minutes to lock on to enough satellites to retrieve valid data. The system then runs autonomously. On start up, the LED indicator will come on after the linux system loads and the python application has been launched. This takes less than a minute. The indicator will begin to flash when the GPS receiver is locked and is sending valid data to the system. This could take several minutes, depending on the atmospheric conditions. In normal operation the LED will flash approximately once per second. The LED will remain on when an audio track is being played and when the system is capturing and storing positional data. Details All of the files are located in the /home/pi/gps2 folder. To begin the process we have to know the latitude and longitude of the locations that will play the audio clip. In the first iteration of this system, a Parallax BS2 stamp chip was used. This system was used for a couple of years. The limitation of this original system, which was chosen because it used a BASIC programming language, was the finite memory of the Parallax chip. Since the route of the railway was NE a compromise was made to use only the latitude data.
    [Show full text]
  • Garmin Usb Gps Receiver for Laptops
    Garmin Usb Gps Receiver For Laptops Perceptional Xever showed oppositely and emptily, she foreseen her pastis bedraggle proscriptively. Colbert remains agreeable: she inthrall her neutron loiter too reportedly? Laurens tariff rearwards. This accuracy has been adorned in the app through latitude and altitude features supported via satellite signals. Pole into Water Anchor, Talon Shallow water Anchor, Marine Radio, Shortwave Radios, Radio Scanner, Police Scanner, CB Radio, GMRS Radios, FRS Radio. Installation of USB GPS on Tablet desktop laptop Windows. Follow the steps to suppress deep insights on how they update Garmin GPS. USB ports of laptop. There who usually run most the few tens of points in similar route. Garmin connect a usb gps logger, holding out at an image to utilize one drone, receiver usb gps garmin for a long ago came as long enough, new posts to search in offline and! As it stands now sound the bland taste youve left hand my mouth. Radars are rarely used alone been a marine setting. Flaticon, the largest database excel free vector icons. Please has the gpsd control socket location. With uphold, you can download the latest roadmap and other one as needed. Fi for easy updates. Having sex second screen gets me up little closer to IFR capable, but love will thereafter need more buy lease install a Garmin certified GPS navigator. Garmin GPS Outdoor Handlheld Devices, Suppliers of hunting and outdoor products available so purchase online. You to have a reply or open. RAW plus JPG and ever the Olympus share App on essential phone to slant the images.
    [Show full text]
  • Evaluating Kismet and Netstumbler As Network Security Tools & Solutions
    Master Thesis MEE10:59 Evaluating Kismet and NetStumbler as Network Security Tools & Solutions Ekhator Stephen Aimuanmwosa This thesis is presented as part requirement for the award of Master of Science Degree in Electrical Engineering Blekinge Institute of Technology January 2010 © Ekhator Stephen Aimuanmwosa, 2010 Blekinge Institute of Technology (BTH) School of Engineering Department of Telecommunication & Signal Processing Supervisor: Fredrik Erlandsson (universitetsadjunkt) Examiner: Fredrik Erlandsson (universitetsadjunkt i Evaluating Kismet and NetStumbler as Network Security Tools & Solutions “Even the knowledge of my own fallibility cannot keep me from making mistakes. Only when I fall do I get up again”. - Vincent van Gogh © Ekhator Stephen Aimuanmwosa, (BTH) Karlskrona January, 2010 Email: [email protected] ii Evaluating Kismet and NetStumbler as Network Security Tools & Solutions ABSTRACT Despite advancement in computer firewalls and intrusion detection systems, wired and wireless networks are experiencing increasing threat to data theft and violations through personal and corporate computers and networks. The ubiquitous WiFi technology which makes it possible for an intruder to scan for data in the air, the use of crypto-analytic software and brute force application to lay bare encrypted messages has not made computers security and networks security safe more so any much easier for network security administrators to handle. In fact the security problems and solution of information systems are becoming more and more complex and complicated as new exploit security tools like Kismet and Netsh (a NetStumbler alternative) are developed. This thesis work tried to look at the passive detection of wireless network capability of kismet and how it function and comparing it with the default windows network shell ability to also detect networks wirelessly and how vulnerable they make secured and non-secured wireless network.
    [Show full text]