Vom 20.12.2025 bis 11.01.2026 ist die Universitätsbibliothek geschlossen. Ab dem 12.01.2026 gelten wieder die regulären Öffnungszeiten. Ausnahme: Medizinische Hauptbibliothek und Zentralbibliothek sind bereits ab 05.01.2026 wieder geöffnet. Weitere Informationen

Treffer: Wireless Network Security Using Raspberry Pi.

Title:
Wireless Network Security Using Raspberry Pi.
Source:
Proceedings of the ASEE Annual Conference & Exposition; 2016, p1-12, 12p
Database:
Complementary Index

Weitere Informationen

This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly affordable, highly portable, easily deployable, alarmingly impactful, and highly rewarding. It also demonstrates the need for secure wireless networks against various attacks such as Man-in-the-Middle (MitM). This paper illustrates step-by-step instructions to assemble and integrate the project's hardware parts, to download and configure software packages, and to perform customized network operations such as packet sniffing and filtering. Kali Linux for Raspberry Pi is the chosen operating system due to its extensive and powerful collection of White Hat hacking tools such as Wireshark (Network Protocol Analyzer), Nmap (Network Mapper), and SSLstrip (Secure Sockets Layer strip). Additional wireless network auditing tools are used from the robust FruityWifi package. Wireshark filters, captures, and analyzes network packets, such as hypertext transfer protocol secure (HTTPS) requests. SSLstrip strips the secure connection and convert HTTPS to hypertext transfer protocol (HTTP), gaining access to sensitive information such as login credentials. This simple to implement yet powerful project, demonstrates the ease of hiding and discreetly deploying a Raspberry Pi on a vulnerable wireless network to sniff network packets that is considered protected behind firewalls, while maintaining a safe distance and anonymity from the target. [ABSTRACT FROM AUTHOR]

Copyright of Proceedings of the ASEE Annual Conference & Exposition is the property of ASEE and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)