New Orleans, Louisiana
June 26, 2016
June 26, 2016
August 28, 2016
Computing & Information Technology
This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly affordable, highly portable, exceptionally easy to deploy, alarmingly impactful, and highly rewarding. It also demonstrates the need for more secure wireless networks against various attacks. This paper illustrates step-by-step instructions to assemble and integrate the project’s hardware parts, to download and configure many software packages, and to perform customized network operations such as packet sniffing and filtering. Kali Linux for Raspberry Pi is the chosen operating system due to its extensive and powerful collection of White Hat hacking tools such as Wireshark (Network Protocol Analyzer), Nmap (Network Mapper), and SSLstrip (Secure Sockets Layer strip). Additional wireless network auditing tools are used from the robust FruityWifi package. Many of the Kali Linux distribution tools are used to gain access to a network and intercept network traffic with the Raspberry Pi posing as a Man in the Middle (MitM) device. Wireshark filters, captures, and analyzes network packets, such as hypertext transfer protocol secure (HTTPS) requests. SSLstrip strips the secure connection and convert HTTPS to hypertext transfer protocol (HTTP), gaining access to sensitive information such as login credentials for various web pages or session information. The number of HTTPS requests is counted and displayed on the liquid crystal display (LCD) screen to illustrate the number of intercepted requests that could be analyzed. This simple to implement yet powerful project, demonstrates the ease of hiding and discreetly deploying a Raspberry Pi on a vulnerable wireless network to sniff network packets that is considered protected behind firewalls, while maintaining a safe distance and anonymity from the target.
BouSaba, C., & Kazar, T., & Pizio, W. C. (2016, June), Wireless Network Security Using Raspberry Pi Paper presented at 2016 ASEE Annual Conference & Exposition, New Orleans, Louisiana. 10.18260/p.27206
ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2016 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015