New Orleans, Louisiana
June 26, 2016
June 26, 2016
June 29, 2016
978-0-692-68565-5
2153-5965
Computing & Information Technology
12
10.18260/p.27206
https://peer.asee.org/27206
8335
* Joined Guilford College in January 2008
* Serves as Assistant Professor in the Computing Technology and information Systems.
I am a current student at Guilford College in the Computing Technology & Information Systems department. I am working on a Capstone project that will be submitted to the ASEE. The project focuses on Wireless Network Security using a Raspberry Pi.
I am currently an Associate Professor of Justice and Policy Studies at Guilford College in Greensboro, NC. I have a Master's and PhD in Criminal Justice from the University at Albany and a Master's in Cyber Security from Utica College. I currently teach both criminal justice and cyber security courses at Guilford.
This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly affordable, highly portable, exceptionally easy to deploy, alarmingly impactful, and highly rewarding. It also demonstrates the need for more secure wireless networks against various attacks. This paper illustrates step-by-step instructions to assemble and integrate the project’s hardware parts, to download and configure many software packages, and to perform customized network operations such as packet sniffing and filtering. Kali Linux for Raspberry Pi is the chosen operating system due to its extensive and powerful collection of White Hat hacking tools such as Wireshark (Network Protocol Analyzer), Nmap (Network Mapper), and SSLstrip (Secure Sockets Layer strip). Additional wireless network auditing tools are used from the robust FruityWifi package. Many of the Kali Linux distribution tools are used to gain access to a network and intercept network traffic with the Raspberry Pi posing as a Man in the Middle (MitM) device. Wireshark filters, captures, and analyzes network packets, such as hypertext transfer protocol secure (HTTPS) requests. SSLstrip strips the secure connection and convert HTTPS to hypertext transfer protocol (HTTP), gaining access to sensitive information such as login credentials for various web pages or session information. The number of HTTPS requests is counted and displayed on the liquid crystal display (LCD) screen to illustrate the number of intercepted requests that could be analyzed. This simple to implement yet powerful project, demonstrates the ease of hiding and discreetly deploying a Raspberry Pi on a vulnerable wireless network to sniff network packets that is considered protected behind firewalls, while maintaining a safe distance and anonymity from the target.
Bousaba, C., & Kazar, T., & Pizio, W. C. (2016, June), Wireless Network Security Using Raspberry Pi Paper presented at 2016 ASEE Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.27206
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2016 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015