This project aims at cracking the Wi-Fi security(WEP,WPA-personal).It basically includes
intrusion in a BSS(Basic Service Set),monitoring the traffic in air, manipulate SSIDs, get details
of clients on a particular SSID, sniffing the packets to & from them to Access point, creating a
false access point, detect hidden SSIDs etc.
Long term goal of the project (part of the project which will be implemented in next semester) is
that once the security is breached and we are able to communicate with the victim we will try to
take over the control of the victim’s system and try to manipulate the data in his system.
2. INTRODUCTION
• This project aims at cracking the wifi
security(WEP,WPA-personal).It basically includes
intrusion in a BSS(Basic Service Set),monitoring the
traffic in air, manipulate SSIDs, get details of clients on
a particular SSID, sniffing the packets to & from them
to Access point, creating a false access point, detect
hidden SSIDs etc.
• Once the security is breached and we are able to
communicate with the victim we tried to take over the
control of the victim’s system and try to manipulate the
data in his system.
•
3. Problem Statement
• We are trying to get an unauthorized access to wireless LAN network. And
then try to retrieve the list of all the connected systems (PCs,
smartphones, or laptops) to that network.
• Then we`ll try to listen to the communication in between the two or more
systems or to get into one selected system from the retrieved list and then
control the functionality of mouse and keyboard of that system and to get
the full access of that system
• This can be done but firstly we need to breach the security of the wireless
LAN network by cracking the security key to enter the network with the
help of software called Wireshark which is used to capture the packets
from the desired network adapter.
• And after capturing the packets Aircrack-ng suite of tools does the actual
cracking for the WEP technology protected systems
• . After getting the security key we can easily enter the network and same
software will provide us the list of connected systems, from which we
select the system we want to control.
4. FUNCTIONAL/NON-FUNCTIONAL
REQUIREMENT
• Functional Requirements
• 1. Two laptops, One access point, external wireless card
• 2. Backtrack VM
• 3. Wireshark
• 4. Aircrack-ng suite of tools
• Non-Functional Requirements
• The project is portable as its about cracking or getting into Wlans and not wired
networks. Project itself deals with breaching the network security so it may not be
ethical to talk about security but as far as security of hacker is concerned hacker is
always less prone to attack as most of the times he is not visible .It requires
maintenance of hardware part to some extent only.
• It is scalable to a large extent as though one wireless card can operate in one channel
at a time but we can make our card hop from channel to another in loop. Response
time is perfect because of tools like aircrack-ng and wireshark. Project has been tested
under 2-3 different scenarios showing positive result
6. Limitations of the solution
• The solution is currently applicable to a limited number of
users and friends as per the data authentication of such
websites.
• The social parameters are fixed
• Location is constrained
• Needs to be generalized at a higher level for more domains
and parameters and users.
• Api authentication constraints