1 Group 4 Autonomous Wi-Fi Sniffer RC Truck GIZMO Sponsor CALIT2 Mentors Javier Rodriguez Molina Don Kimball Group Members Dan Curcio Anson Hsu.

Slides:



Advertisements
Similar presentations
Brute Force Attack Against Wi-Fi Protected Setup
Advertisements

1 ECE 191 Group 4 Autonomous Wi-Fi Sniffer RC Truck GIZMO Sponsor CAL-IT 2 Mentors Javier Rodriguez Molina Don Kimball Group Members Dan Curcio Anson Hsu.
Gizmo Remote Operated Bluetooth Interface (GROBI) Sponsor: Calit 2 Mentors: Paul Blair & Javier Rodriguez Molina Team: Kristi Tsukida & Eldridge Alcantara.
GROBI Gizmo Remote Operated Bluetooth Interface Sponsor: Calit 2 Mentors: Paul Blair & Javier Rodriguez Molina Team: Kristi Tsukida & Eldridge Alcantara.
1 Group 4 Autonomous Wi-Fi Sniffer RC Truck GIZMO Sponsor CALIT2 Mentors Javier Rodriguez Molina Don Kimball Group Members Dan Curcio Anson Hsu.
LAN Devices 5.3 IT Essentials.
Networking | Hardware Components
“All your layer are belong to us” Rogue APs, DHCP/DNS Servers, and Fake Service Traps.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Students:Gilad Goldman Lior Kamran Supervisor:Mony Orbach Mid-Semester Presentation Spring 2005 Network Sniffer.
ODOS The Office of the Dean of Students. Projects Interactive Campus Map Global Positioning System - Device for the Visually Impaired Adjustable Table.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
MIS Week 11 Site:
MESH Implementation With AP5131 version R.
Leading Edge Climbing Equipment
Ch. 5 – Access Points. Overview Access Point Connection.
Data Communications and Networks
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 Input/Output. 2 Principles of I/O Hardware Some typical device, network, and data base rates.
1 Chapter Overview Network devices. Hubs Broadcast For star topology Same as a repeater Operate at the physical layer 2.
Computer communication
Module 13: Network Load Balancing Fundamentals. Server Availability and Scalability Overview Windows Network Load Balancing Configuring Windows Network.
COEN 252 Computer Forensics
Wireless Security: A Search for Public and Secure Wireless networks Kory Kirk.
GROBI Gizmo Remote Operated Bluetooth Interface Sponsor: Calit 2 Mentors: Paul Blair & Javier Rodriguez Molina Team: Kristi Tsukida & Eldridge Alcantara.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Project Idea #1 Project: Simulation in NS Learn how to use NS-2 Examine 2-3 papers that do benchmark studies Implement a simulation of the Drexel TAARP.
1. Insert the Resource CD into your CD-ROM drive, click Start and choose Run. In the field that appears, enter F:\XXX\Setup.exe (if “F” is the letter of.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
FotoGazmic Software (From left to right: Chad Zbinden, Josey Baker, Rob Mills, Myra Bergman, Tinate Dejtiranukul)
The Filer Proj-354 Apr 29 th, 2010 Group members Henry Au Wayne Choi Jaewon Yoo
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
HNC COMPUTING - Network Concepts 1 Network Concepts Devices Introduction into Network Devices.
Software Development Cycle What is Software? Instructions (computer programs) that when executed provide desired function and performance Data structures.
COMP 208/214/215/216 – Lecture 8 Demonstrations and Portfolios.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
Introduction Chapter 1. Business Applications of Networks A network with two clients and one server. Client-Server Model.
Wireless Intrusion Detection & Response ECE 4006 Group 2: Seng Ooh Toh Varun Kanotra Nitin Namjoshi Yu-Xi Lim.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Source insight with Z-Stack 김백규. Review Z-Stack Structure.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Network Concepts.
Positioning Relay of Wirelessly Networked Devices
Chapter Objectives In this chapter, you will learn:
Wireless Technologies
Remote desktop into raspberry pi from mac and iPhone
Wireless Network Security
March 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4 RFWaves MAC Proposal Overview Date Submitted:
Advanced Penetration testing
Layered Architectures
Using MIS 2e Chapter 6 Appendix
Networks and Connecting to the Internet
How does IT enable our business?
Transparent Wireless Authentication For New Wireless Network
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Wireless Security Ian Bodley.
Networking | Hardware Components
Digital Pacman: Firewall Edition
Advanced Penetration testing
Advanced Penetration testing
Computing Over Distance
Network Models, Hardware, Protocols and number systems
March 01 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: TG4 RFWaves MAC Proposal Overview Date Submitted:
Joint Application Development (JAD)
Advanced Penetration testing
Presentation transcript:

1 Group 4 Autonomous Wi-Fi Sniffer RC Truck GIZMO Sponsor CALIT2 Mentors Javier Rodriguez Molina Don Kimball Group Members Dan Curcio Anson Hsu

2 Agenda o Gantt Chart o Tasks Performed (week 5) o Technical Content o NMEA data parser o Client IP vs. MAC spoofing o Kismet and Wireless Network Overview o Goals for Next Week o Questions and Feedback

3 Gantt Chart

4 Accomplishments this Week Acquired support hardware (crossover cables) Modified GPS interface code (Anson) Planned meeting with software support (Anson) Upgraded wireless card hardware on development PC (Dan) Reviewed Kismet documentation (Dan) Researched/discussed client detection options (Both)

5 NMEA Data parser Essential data – Latitude (green) – Longitude (blue) – Timestamp (gray) String markers (red), if not found, returns error Measurements status (red) – If A(ctive), get data, if V(oid), try/catch/error block Takes input from GPS unit as string, uses string index as markers for information-grabbing

6 Client Detection Options Active methods – IP/MAC address spoofing Pose as access point IP and measure incoming packets Problematic due to wireless mesh architecture / idle users Passive methods – Measure all network activity. Packet origins and destinations (not IP specific) Disruptive methods – Reboot the network, force everyone in vicinity to actively reconnect

7 How Do Wireless Clients and APs Differ? A typical Wi-Fi setup contains one or more Access Points (APs) and one or more clients. However, wireless networks can also be construced with no central access point – Called Ad-Hoc or Peer-to-Peer networking – This is typical of a mesh network Detecting other clients is the biggest challenge in our implementation.

8 Kismet Software Overview Kismet offers a solution to our client detection problem. Kismet is an open source wireless network detector, sniffer, and intrusion detection system. It works by examining packets that are being transmitted. Correction: It is unique in that it is able to detect the presence of both wireless access points and wireless clients, and associate them to each other.

9 Kismet Software – Screen Shot Image courtesy Kismet.com

10 Goals for Next Week Develop GPS code for error handling Begin development of web interface Further develop Kismet+client software Adapt Kismet code to the Gizmo application