Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Network Security Report: Penetration Tools for Network Security
Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE).
2014 (English)Student paper second term, 5 credits / 7,5 HE creditsStudent thesis
Abstract [en]

This report, will show by demonstration with Network Penetration, how to reveal security holes by using the same methods as an outside attack and carry out attacks against wired and wireless networks when it comes to sniffing user traffic, abuse VLAN, cracking password, WEP, WPA/WPA2, hacking WPS and analysing traffic.

The tests was performed at the Halmstad University with lab equipment and at home with own equipment. Using Backtrack 5 R3 which is compatible with Linux, performance of the tests could be done by making use of various tools that comes with Backtrack.The goal of the project was to demonstrate how to reveal security holes by using the same methods as an outside attack. By testing, demonstrate and report the security of wired and wireless network, the achievement of these goals could be done and a greater insight into network security was gained, which gives more experience and knowledge that can be taken to a future professional life.

The results show how simple it can be to abuse a network or sniff a password if there is no attention to the safety and the security configurations that can be implemented.In other words, during this project, both learning and demonstration has been done to show how vulnerable individuals, civilians and entrepreneurs are. It is easier than someone can imagine to obtaining unauthorized information that nobody wants to share out.

Place, publisher, year, edition, pages
2014. , 41 p.
Keyword [en]
Network Project, Network Security, Penetration Tools, Project Report
National Category
Communication Systems Computer Systems Other Engineering and Technologies not elsewhere specified
Identifiers
URN: urn:nbn:se:hh:diva-24545OAI: oai:DiVA.org:hh-24545DiVA: diva2:694738
Subject / course
Computer Network Engineering
Supervisors
Examiners
Available from: 2014-02-12 Created: 2014-02-07 Last updated: 2014-02-12Bibliographically approved

Open Access in DiVA

fulltext(2840 kB)3227 downloads
File information
File name FULLTEXT02.pdfFile size 2840 kBChecksum SHA-512
c71e2358c54deadba7cbf6b2ecce58a3579e847f7e4f18a3050c463c2660ec6eecdd26bcd12614abe0605e8c2f01be62527fdf304ae0df976fde051cacfa62c3
Type fulltextMimetype application/pdf

By organisation
School of Information Science, Computer and Electrical Engineering (IDE)
Communication SystemsComputer SystemsOther Engineering and Technologies not elsewhere specified

Search outside of DiVA

GoogleGoogle Scholar
Total: 3228 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1224 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf