The ubiquitous nature of Wireless internet, portable 3G and 4G devices have made the use of Wi-Fi easy for common man. People make use of internet devices, mobile hotspots, SIM based 4G routers to connect to the internet within workplace. This phenomenon is not only a breach of workplace?s security
WiFly
The ubiquitous nature of Wireless internet, portable 3G and 4G devices have made the use of Wi-Fi easy for common man. People make use of internet devices, mobile hotspots, SIM based 4G routers to connect to the internet within workplace. This phenomenon is not only a breach of workplace’s security policy but can also lead to leakage of sensitive data, pilferage of critical information. Our reconnaissance device is mobile friendly with reasonable processing, coupled with multi-range, removable antennas for scanning in-range Wi-Fi devices. Its detailed information gathering, and passive scanning firstly apprise the administrators about Wi-Fi access points which are illegally operating in the vicinity and secondly, provide all minute details about these internet connections like (MACs, vendor IDs, country of origin, encryption standard, connected devices etc.). It also gives detailed information of all company systems connected to these unlawful internet connections, which will help apprehend the disgruntled human resources. Moreover, this device has a feature to block these unlawful connections and a feature to penetrate these Wi-Fi networks by launching a wide variety of wireless attacks for further reconnaissance and scanning on connected clients. This device offers an easy-to-use interface for administrators to manage and control the device.
1)To come up with a smart and easy to use Reconnaissance and Assault system for WiFi networks that would gather all information about in-range active WiFi devices, sniff and passively monitor their ingress and egress traffic, block unlawful WiFi access points, penetrate them launch further reconnaissance and scanning on connected hosts.
2)To explore a key area of Wireless (WiFi) security and analyze implementation loopholes, especially those related to encryption and security, explore further research avenues and dig deeper in the area to build expertise in the area of securing WiFi networks along with enforcement of related organizational policies.
First of all, our device is going to establish a secure database, by inculcating authorized users and device information associated with the organizational network. Our device is not going to interact with the users within the database but will surely act against all available resources that are not enlisted in the database and are located in near vicinity of the organization. Our device visualizes the Wi-Fi landscape and the relationships between access points and devices, monitors and collects data from all the access points in the vicinity by performing Man In The Middle attack (MITM) to capture the handshakes by using our automated python script. Its detailed information gathering and passive scanning would firstly apprise the administrators about Wi-Fi access points which are illegally operating in the vicinity and secondly, provide all minute details about these internet connections like (MACs, vendor IDs, country of origin, encryption standard, connected devices etc.).
This device will further knock out any illegal/un-registered access points by de-authenticating them, so that no user can connect itself with it and fall a victim which may lead to data breach. In addition to this, our device provides further reconnaissance which leads to WPA/WPA2 enterprise attacks and extracts the desired credentials of the target access point. Once we gain access to the target network, with the help of extracted credentials, we can easily monitor/analyze the traffic being communicated by the target network.
Our device is a blend of complex functionality with an ease of simple user interface.
The biggest asset of any organization, whether small or large scale, is its data. Over the past few years, the world has seen big data breaches without the discrimination of the scale of organization. Our proposed solution/device will not only be useful for a variety of organizations but will surely attract law enforcement agencies, where data breach is not affordable at any cost. Talking about how many would benefit from it? This device will come handy for almost all types of businesses as the modern era is all about internet and wireless connectivity. As our device functions as an exploiting tool as well it tends to be extremely valuable in the field of forensics, where passive mode reconnaissance is recognized, and this is all around upheld by our gadget. So, this gadget can be utilized anywhere where monitoring and wellbeing of information is main concern.
1) Hardware:
2) Software:
3) Networks:
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Raspberry Pi 4 8GB RAM Model B Quad | Equipment | 1 | 19700 | 19700 |
| Raspberry Pi 4 Case | Equipment | 1 | 1350 | 1350 |
| LattePanda LCD for Raspberry | Equipment | 1 | 7500 | 7500 |
| Alfa AWUSO36NH | Equipment | 2 | 14500 | 29000 |
| Aukey 20100mAh Power Bank | Equipment | 1 | 8000 | 8000 |
| Jazz 4G Device | Miscellaneous | 1 | 4500 | 4500 |
| Online Paid Course | Miscellaneous | 1 | 2500 | 2500 |
| Brochure | Miscellaneous | 100 | 30 | 3000 |
| Total in (Rs) | 75550 |
?BlindVision is an Android application that will help blind and visually impaired people c...
This project is aimed to develop an Android Application named as ?Students? Attendance Man...
A refrigerator is a commercial and home appliance consisting of a ...
Abc Project Objectives (less than 2500 characters)
Water is the very basic need of every living thing in this universe, without water we can?...