After we constitute the four-man group, we met our supervisor, Professor Marshall and received a brief introduction of our project.
Generally, our project is related to the wireless network. Before we attended the first meeting, we have done some preview about wireless network. For example, we searched some basic concepts such as AP (Access Point) and 802.11 (a wide-received wireless network principle) and we distinguished the difference between the WLAN and Wi-Fi. The supervisor used a PPT to show us the theory of wireless attack and defense, which rectify our misunderstanding that the wireless intrusion is not simply password cryptanalysis but various attack in different layer. He also showed us the popular software Backtrack (for attack) and Kismet (for detection).
With this simple acknowledgement of the project, we build an incomplete model of the intrusion detection constituting two PCs (one has installed backtrack and the other installed kismet), a user device (smartphone, iPad or PC) and an AP. We used to plan to use the attacking PC to disconnect the AP with user device and the attacker would pretend to be the AP and steal information from the user. Nevertheless, at the moment we could not make out the details of the process and the software being used only worked in the Linux circumstance which we know nearly nothing about it.
Therefore, we need do much work on the use of the Backtrack as well as Kismet and work hard to grasp the specific process of wireless intrusion detection.
没有评论:
发表评论