Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Describe the role of an Access Points and SSIDs in a wireless environment. Also,

ID: 3737911 • Letter: D

Question

Describe the role of an Access Points and SSIDs in a wireless environment. Also, include any precautions that are necessarily related to APs and SSIDs. Provide citations to any references you might have used.Describe any two types of common attacks and defense mechanisms related to wireless environments

Do a Google search for any available tools to sniff for open networks or use of wardriving. If possible try one of these tools such as TCPdump and provide results. If you are not able to do that, just describe an available tool, provide its URL

Explanation / Answer

An access point is a device, consistbuiltintegrated a wireless router, that lets builtintegrated wi-fi devices to hook up with a network. most get right of entry to integrated have routers, at the same time as others need to be linked to a router as a way to offer community access. In either case, get right of entry to built-in are generally hardwired to other gadgets, builtintegrated community switches or broadband modems.

An SSID (service set identiwi-fier) is the number one name associated with an 802.eleven wireless nearby region community (WLAN) including domestic networks and public hotspots. consumer gadgets use this name to pick out and be a part of wi-wiwireless networks.

for instance, say you're trying to connect with a wi-fi community at paintings or school it really is called guestnetwork, but you notice several others within variety which can be called something completely distinctive.

all of the names you spot are the SSIDs for those wi-fi networks.

On home networks, a broadband router or broadband modem stores the SSID but allows directors to alternate it. Routers can broadcast this call to assist wi-wiwireless customers wi-fi the community.
What an SSID looks like

The SSID is a case-sensitive text string that may be as long as 32 characters which include letters and/or numbers. within those guidelines, the SSID can say whatever.

Router manufacturers set a default SSID for the unit, including Linksys, xwi-finitywiwireless, NETGEAR, dlink or just default. however, for the reason that SSID can be wi-fiedwireless, not all wi-wiwireless networks have a general name like that.
How gadgets Use SSIDs

wi-fi devices like telephones and laptops scan the local area for networks broadcasting their SSIDs and provides a list of names. A user can initiate a new community connection by means of picking a call from the list.

similarly to obtaining the network's call, a scan also determines whether or not each network has wi-fiwireless protection options enabled.

In maximum cases, the tool identiwirelesses a secured network with a lock image subsequent to the SSID.

most wi-fi wireless devices hold tune of the different networks a user joins in addition to the relationship choices. specially, customers can installation a device to mechanically be part of networks having sure SSIDs by using saving that setting into their prowi-files.

In other words, as soon as related, the tool normally asks if you want to shop the community or reconnect mechanically inside the destiny. what's greater is that you may installation the relationship manually without even gaining access to the community (i.e. you can "connect" to the community from afar so that after in variety, the tool is aware of how to log in).

maximum wireless routers offer the choice to disable SSID broadcasting as a way to ostensibly improve a network security since it essentially requires the customers to understand "passwords," the SSID and the network password. but, the effectiveness of this technique is limited seeing that it's fairly easy to "sniff out" the SSID from the header of information packets flowing thru the router.

Connecting to networks with SSID broadcast disabled calls for the user to have manually created a prowi-file with the name and other connection parameters.
problems With SSIDs

consider these ramiwi-fications of the way wi-fi community names work:

If a community does now not have wi-fiwireless protection alternatives enabled, every body can connect to it by means of knowing most effective the SSID.
using a default SSID increases the chance that some other close by network will have the identical name, confusing wi-fiwireless clients. whilst a device discovers networks with the same call, it will prefer and may strive automobile-connecting to whichever one has a stronger radio sign, which is probably the unwanted choice. inside the worst case, someone might get dropped from their personal home community and reconnected to a neighbor's who does no longer have login safety enabled.

The SSID chosen for a home network have to comprise only frequent facts. a few names (like HackMeIfYouCan) unnecessarily trap thieves to goal sure houses and networks over others.
An SSID can incorporate publicly-visible offensive language or coded messages.
get entry to integrated can be located built-inintegrated locations, built-inintegrated homes, busbuiltintegrated, and public locations. In maximum homes, the get right of entry to built-inpobuiltintegrated is a wi-fi router, that is connected to a DSL or cable modem. however, a few modems may also integrated wireless abilities, makintegratedg the modem itself the access built-inpobuiltintegrated. huge built-inagencies frequently offer several get admission to built-inpobuiltintegrated, which permitsintegrated employees to wirelessly hook up with a valuable community from a wide variety of locations. Public get entry to built-inpobuiltintegrated can be determbuiltintegrated built-in shops, coffee shops, built-in, libraries, and different places. some towns provide public access integrated built-inintegrated shape of wi-fiwireless transmitters which can be linked to streetlights, symptoms, and other public objects.

while get right of entry to built-in usually offer wifi wireless access to the built-in, some are built-intended only to provide access to a closed community. for example, a built-iness may additionally offer secure get admission to built-ints to its employees to be able to wirelessly get entry to wi-fidocuments from a community server. additionally, maximum get admission to factorsintegrated offer access, however it is viable for an get entry to factorintegrated to refer to a Bluetooth tool or other type of wireless connection. however, the motive of maximum get entry to built-in is to offer built-in access to connected users.

The time period "get right of entry to factorintegrated" is regularly used synonymously with base station, though base stations are technically simplest gadgets. it may also be abbreviated AP or WAP (for wi-fiwireless access built-int). however, WAP isn't always as generally used as AP considerbuiltintegrated WAP is the standard acronym for wi-fiwireless get entry to Protocol.

The below are the kali linux sniffing tools u can use it

Darkstat
Darkstat is a simple, web based totally community traffic analyzer utility. it works on many famous operating structures like Linux, Solaris, Mac and AIX. It keeps walking inside the heritage as a daemon and maintains amassing and sniffing community statistics and affords it in without difficulty comprehensible layout inside its net interface. it may generate visitors reports for hosts, pick out which ports are open on some specific host and is IPV 6 complaint utility. allow’s see how we will installation and configure it on Linux running machine.


DNSChef
DNSChef is a tremendously configurable DNS proxy for Penetration Testers and Malware Analysts. A DNS proxy (aka “fake DNS”) is a device used for utility community visitors analysis among different uses. as an instance, a DNS proxy can be used to faux requests for “badguy.com” to factor to a neighborhood system for termination or interception as opposed to a real host somewhere at the internet.

There are several DNS Proxies accessible. maximum will truely point all DNS queries a single IP cope with or put in force most effective rudimentary filtering. DNSChef changed into advanced as a part of a penetration take a look at where there has been a want for a more configurable device. As a result, DNSChef is go-platform application able to forging responses based totally on inclusive and distinct area lists, supporting multiple DNS document kinds, matching domain names with wildcards, proxying real responses for nonmatching domains, defining external configuration documents, IPv6 and many other features. you may locate certain rationalization of every of the capabilities and suggested uses under.

using DNS Proxy is recommended in situations wherein it is not viable to pressure an utility to use a few other proxy server directly. as an example, some mobile packages completely ignore OS HTTP Proxy settings. In these instances, the use of a DNS proxy server consisting of DNSChef will will let you trick that application into forwarding connections to the preferred vacation spot.


DNSSpoof
DnsSpoof forges replies to arbitrary DNS address / pointer queries at the inner LAN. this is useful in bypassing host call based totally get right of entry to controls, or in implementing a ramification of green community controls.

In a corperate network DnsSpoof can be used to successfully factor clients to internal machines as a substitute on externally established ones. Or, it may be used to hold customers from going to certain host names that aren't allowed via policy policies.


dsniff
The potential to get entry to the uncooked packets on a network interface (referred to as community sniffing), has long been an vital tool for gadget and community administrators. For debugging functions it's far regularly useful to have a look at the network visitors all the way down to the twine stage to look precisely what is being transmitted. Dsniff, because the call implies, is a community sniffer - but designed for checking out of a extraordinary kind. Written via hacker Dug song, dsniff is a package of utilities that consists of code to parse many one-of-a-kind application protocols and extract interesting statistics, such as usernames and passwords, net pages being visited, contents of e mail, and more. moreover, it can be used to defeat the regular behaviour of switched networks and motive network visitors from different hosts on the equal community section to be visible, now not just visitors regarding the host dsniff is jogging on.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote