Topic:Computer science ( choose topic)
Subject:Computer science
Volume: 6 pages
Type: Research paper
Format: APA
Description
Topic 1) Viewing WLAN Security Information with Vistumbler Vistumbler can be used to display the security information that is beaconed out from WLANs. Note that Vistumbler does not allow you to “crack” any WLANs but instead only displays information. In this assignment, you will use Vistumbler to view this information. This assignment works best when you are in an area in which you can pick up multiple WLAN signals. a) What authentication types are listed? b) Record the total number of different WLANs that you are able to detect, along with the number of encryption types. Which type is most common? Which types are most secure and least secure? Topic 2) Substitute a MAC Address Using SMAC (or use application/package of your choice regardless of any OS) Although MAC address filters are often relied upon to prevent unauthorized users from accessing a wireless LAN, MAC addresses can easily be spoofed. In this assignment, you will substitute a MAC address. a) Show your current MAC address and spoofed MAC address. b) Verify Organizational Unique Identifier of MAC address to make sure that the OUI code represents correct organization. Topic 3) Use an Online Rainbow Table Cracker Although brute force and dictionary attacks were once the primary tools used by attackers to crack stolen digest passwords, more recently attackers have used rainbow tables. Rainbow tables make password attacks easier by creating a large pre-generated data set of candidate digests. In this project, you will create a hash on a password and then crack it with an online rainbow table cracker to demonstrate the speed of using rainbow tables. You can find an online rainbow cracker at https://crackstation.net/ a) How long did it take this online rainbow table to crack given hash? b) What is salted and non-salted hash value? What you will be including in the assignment if you work on this paper? You will be including the following: a. Problem statement b. Summary of problem resolution. How the author tackle the problems? c. Limitations of problem resolution d. Any future work you think is important in the context of this research paper. Whenever you cite other’s work, please use APA style referencing. Arial Size 12