Adil Khan 10 months ago
AdiKhanOfficial #FYP Ideas

WiFly

The ubiquitous nature of Wireless internet, portable 3G and 4G devices have made the use of Wi-Fi easy for common man. People make use of internet devices, mobile hotspots, SIM based 4G routers to connect to the internet within workplace. This phenomenon is not only a breach of workplace?s security

Project Title

WiFly

Project Area of Specialization

Cyber Security

Project Summary

The ubiquitous nature of Wireless internet, portable 3G and 4G devices have made the use of Wi-Fi easy for common man. People make use of internet devices, mobile hotspots, SIM based 4G routers to connect to the internet within workplace. This phenomenon is not only a breach of workplace’s security policy but can also lead to leakage of sensitive data, pilferage of critical information. Our reconnaissance device is mobile friendly with reasonable processing, coupled with multi-range, removable antennas for scanning in-range Wi-Fi devices. Its detailed information gathering, and passive scanning firstly apprise the administrators about Wi-Fi access points which are illegally operating in the vicinity and secondly, provide all minute details about these internet connections like (MACs, vendor IDs, country of origin, encryption standard, connected devices etc.). It also gives detailed information of all company systems connected to these unlawful internet connections, which will help apprehend the disgruntled human resources. Moreover, this device has a feature to block these unlawful connections and a feature to penetrate these Wi-Fi networks by launching a wide variety of wireless attacks for further reconnaissance and scanning on connected clients. This device offers an easy-to-use interface for administrators to manage and control the device.

Project Objectives

1)To come up with a smart and easy to use Reconnaissance and Assault system for WiFi networks that would gather all information about in-range active WiFi devices, sniff and passively monitor their ingress and egress traffic, block unlawful WiFi access points, penetrate them launch further reconnaissance and scanning on connected hosts.

2)To explore a key area of Wireless (WiFi) security and analyze implementation loopholes, especially those related to encryption and security, explore further research avenues and dig deeper in the area to build expertise in the area of securing WiFi networks along with enforcement of related organizational policies.

Project Implementation Method

First of all, our device is going to establish a secure database, by inculcating authorized users and device information associated with the organizational network. Our device is not going to interact with the users within the database but will surely act against all available resources that are not enlisted in the database and are located in near vicinity of the organization. Our device visualizes the Wi-Fi landscape and the relationships between access points and devices, monitors and collects data from all the access points in the vicinity by performing Man In The Middle attack (MITM) to capture the handshakes by using our automated python script. Its detailed information gathering and passive scanning would firstly apprise the administrators about Wi-Fi access points which are illegally operating in the vicinity and secondly, provide all minute details about these internet connections like (MACs, vendor IDs, country of origin, encryption standard, connected devices etc.).

This device will further knock out any illegal/un-registered access points by de-authenticating them, so that no user can connect itself with it and fall a victim which may lead to data breach. In addition to this, our device provides further reconnaissance which leads to WPA/WPA2 enterprise attacks and extracts the desired credentials of the target access point. Once we gain access to the target network, with the help of extracted credentials, we can easily monitor/analyze the traffic being communicated by the target network.

Our device is a blend of complex functionality with an ease of simple user interface.

Benefits of the Project

The biggest asset of any organization, whether small or large scale, is its data. Over the past few years, the world has seen big data breaches without the discrimination of the scale of organization. Our proposed solution/device will not only be useful for a variety of organizations but will surely attract law enforcement agencies, where data breach is not affordable at any cost. Talking about how many would benefit from it? This device will come handy for almost all types of businesses as the modern era is all about internet and wireless connectivity. As our device functions as an exploiting tool as well it tends to be extremely valuable in the field of forensics, where passive mode reconnaissance is recognized, and this is all around upheld by our gadget. So, this gadget can be utilized anywhere where monitoring and wellbeing of information is main concern.

Technical Details of Final Deliverable

1) Hardware:

  •  Raspberry pi as a module for OS
  •  Network adapters for traffic capturing and analyzing
  •  Portable internet device 
  •  Power backup 

2) Software:

  •  Kali Linux
  •  Raspbian
  •  Pycharm
  •  Bash Scripting
  •  Wireshark
  • Scapy
  • Windows 10

3) Networks:

  •  SSH
  •  Threading/Multi-threading
  •  Sniffing 
  • Scanning

Final Deliverable of the Project

HW/SW integrated system

Core Industry

IT

Other Industries

Security

Core Technology

Others

Other Technologies

Sustainable Development Goals

Industry, Innovation and Infrastructure

Required Resources

Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Raspberry Pi 4 8GB RAM Model B Quad Equipment11970019700
Raspberry Pi 4 Case Equipment113501350
LattePanda LCD for Raspberry Equipment175007500
Alfa AWUSO36NH Equipment21450029000
Aukey 20100mAh Power Bank Equipment180008000
Jazz 4G Device Miscellaneous 145004500
Online Paid Course Miscellaneous 125002500
Brochure Miscellaneous 100303000
Total in (Rs) 75550
If you need this project, please contact me on contact@adikhanofficial.com
Blind Vision

?BlindVision is an Android application that will help blind and visually impaired people c...

1675638330.png
Adil Khan
10 months ago
Students\' Attendance Management (SAM), For SMIU

This project is aimed to develop an Android Application named as ?Students? Attendance Man...

1675638330.png
Adil Khan
10 months ago
Development of Vapour Compression Refrigerator Working On Solar And Pe...

A refrigerator is a commercial and home appliance consisting of a&nbsp...

1675638330.png
Adil Khan
10 months ago
IOT based smart irrigation system using smart sensors

Abc Project Objectives (less than 2500 characters)

1675638330.png
Adil Khan
10 months ago
A Smart Atmospheric Water Generator

Water is the very basic need of every living thing in this universe, without water we can?...

1675638330.png
Adil Khan
10 months ago