Asee peer logo

Wireless Network Security Using Raspberry Pi

Download Paper |

Conference

2016 ASEE Annual Conference & Exposition

Location

New Orleans, Louisiana

Publication Date

June 26, 2016

Start Date

June 26, 2016

End Date

August 28, 2016

ISBN

978-0-692-68565-5

ISSN

2153-5965

Conference Session

Emerging Computing and Information Technologies I

Tagged Division

Computing & Information Technology

Page Count

12

DOI

10.18260/p.27206

Permanent URL

https://peer.asee.org/27206

Download Count

5062

Request a correction

Paper Authors

biography

Chafic BouSaba Guilford College

visit author page

* Joined Guilford College in January 2008
* Serves as Assistant Professor in the Computing Technology and information Systems.

visit author page

biography

Tiera Kazar Guilford College

visit author page

I am a current student at Guilford College in the Computing Technology & Information Systems department. I am working on a Capstone project that will be submitted to the ASEE. The project focuses on Wireless Network Security using a Raspberry Pi.

visit author page

biography

Will C. Pizio Guilford College

visit author page

I am currently an Associate Professor of Justice and Policy Studies at Guilford College in Greensboro, NC. I have a Master's and PhD in Criminal Justice from the University at Albany and a Master's in Cyber Security from Utica College. I currently teach both criminal justice and cyber security courses at Guilford.

visit author page

Download Paper |

Abstract

This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly affordable, highly portable, exceptionally easy to deploy, alarmingly impactful, and highly rewarding. It also demonstrates the need for more secure wireless networks against various attacks. This paper illustrates step-by-step instructions to assemble and integrate the project’s hardware parts, to download and configure many software packages, and to perform customized network operations such as packet sniffing and filtering. Kali Linux for Raspberry Pi is the chosen operating system due to its extensive and powerful collection of White Hat hacking tools such as Wireshark (Network Protocol Analyzer), Nmap (Network Mapper), and SSLstrip (Secure Sockets Layer strip). Additional wireless network auditing tools are used from the robust FruityWifi package. Many of the Kali Linux distribution tools are used to gain access to a network and intercept network traffic with the Raspberry Pi posing as a Man in the Middle (MitM) device. Wireshark filters, captures, and analyzes network packets, such as hypertext transfer protocol secure (HTTPS) requests. SSLstrip strips the secure connection and convert HTTPS to hypertext transfer protocol (HTTP), gaining access to sensitive information such as login credentials for various web pages or session information. The number of HTTPS requests is counted and displayed on the liquid crystal display (LCD) screen to illustrate the number of intercepted requests that could be analyzed. This simple to implement yet powerful project, demonstrates the ease of hiding and discreetly deploying a Raspberry Pi on a vulnerable wireless network to sniff network packets that is considered protected behind firewalls, while maintaining a safe distance and anonymity from the target.

BouSaba, C., & Kazar, T., & Pizio, W. C. (2016, June), Wireless Network Security Using Raspberry Pi Paper presented at 2016 ASEE Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.27206

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2016 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015