Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
HIT8071 Professional Project Detecting Rogue Access Points by Team Net+Worth Client : Dr. Philip Branch Project Supervisor : Mr. Graham Farrell
Team Members AsiriRajapakse 6570534 Prasad Chitraju 6596207 PrashanthPhutane 655623X Roger De Couto 6554873 ShrisharanRamachandran 6584608
Outline • Introduction • Wireless Networks and Rogue Access Point’s. • Methods available to Detect Rogue Access Point’s • Rogue Buster integrated with Kismet • Conclusion
Introduction Goals: • To address one of the most well known challenges to wireless networks known as “Rogue Access Points”. • Provide an effective solution for identifying these rogue devices. • Solution- wireless sniffing tool. Objectives: • Analyse the use of wireless sniffing tools to detect rogue access points. • Building a viable solution for detecting rogue access points.
Why implement wireless? Its Comparatively : Cheap Easy Flexible Convenient for users
Rogue AP’s? Unauthorised Access Point
Available Wireless Scanners • Netstumbler • Nessus • Kismet
Why Kismet ? OTHERS Vs. • Passive (No detectable packets) • Undetectable • Saves output in different formats . (Ex: .csv, .xml and .txt) • Detectable (Due to active scanning) • Output in different formats (no .csv) • Rogue access point detection method(Blocked by firewalls)
How does Kismet work ? Server Server Access Point Client Monitor Mode Local Host
Rogue Buster Development phases
Why should you use Rogue Buster? • High Accuracy. • Free software(for now!). • Can be run on any laptop which has a wireless card. • Database of Legitimate Access Points can be used as tracker. • Multi task with ease!
Conclusion • Reliable, Efficient…It “Simply” Works!!! • Kismet Wireless Scanner • Who and Why use it