Investigating a Wireless Network Attack!

Introduction

The swift development in the internet transmission technologies has continued to increase against intrinsic safety issues and latest forms of attack. Little knowledge about this issues put together with the ability of online hackers to control wireless network systems from a safe distance has resulted to many problems for the researcher mandated to investigate substance evidence of such attacks. These challenges are propagated by the venerability of the network traffic which is broadcasted over the radio wave. Consequently this provides access point to the attacker who has a suitable equipment to tap these waves.


Wireless LANs was introduced a few years back, and it has received quite a warm embrace in most of the modern towns and cities. This network system are now functioning in places such as; cafes, offices, and in some access hotspots available in civic spaces, in some places. The suitable forensics tool to enable access points on the network is a TRENDnet TEW-T1. This is one of the Wi-Fi detector tools which are mostly hand held. The key purpose of this tool is to survey an area for use of Wi-Fi broadband as an access point on the network, as well as, detecting any available non-Wi-Fi transmissions that many cause interference in the area. Leon Stringer (2005).


The best forensics tool for identifying routers on the network is IOS NetFlow: This tool collects and measures IP packet attributes of each packet furthered through routers or switches, groups similar packets into a flow, to help comprehend who, what when, where and how the traffic is flowing. Furthermore, it is used in detecting network irregularities, as well as, susceptibilities. J. Kaur, Gurpal S. & Manpreet S. (2012). The reason for choosing this tool was motivated by the fact that, it has a collection of simultaneous activities running at the same time. It will be installed in the Linux Laptop since it will be used as the beginner launcher of collecting and measuring IP data.  Configuring WPA will require launching operations done through adaptor installations secure passwords for local hotspots.


Reference:

J. Kaur, Gurpal S. & Manpreet S. (2012) Design & Implementation of Linux based Network Forensic System using Honeynet: Journal of IJARCET vol. 1, issue 4 Retrieved on July 26, 2012http://ijarcet.org/index.php/ijarcet/article/download/189/pdf.

Leon Stringer (2005) Detecting and Investigating Wireless LAN Security Breaches Retrieved on July 26, 2012





Is this your assignment or some part of it?

We can do it for you! Click to Order!



Order Now


Translate »

You cannot copy content of this page