Question
Project 9-1: Viewing WLAN Security Information with Vistumbler Vistumbler can be used to display the security information that is beaconed out from WLANs. Note that
Project 9-1: Viewing WLAN Security Information
with Vistumbler
Vistumbler can be used to display the security information that is beaconed
out from WLANs. Note that Vistumbler does not allow you to crack any
WLANs but instead only displays information. In this project, you will use
Vistumbler to view this information. This project works best when you are in
an area in which you can pick up multiple WLAN signals.
1. Use your web browser to go to www.vistumbler.net.
The location of content on the Internet may change without warning.
If you are no longer able to access the program through the
above URL, use a search engine and search for Vistumbler.
2. Click EXE Installer (Mirror).
3. Follow the prompts to download and install Vistumbler.
4. If the program does not start after the installation is complete, launch
Vistumbler.
5. If necessary, expand the window to full screen.
6. Click Scan APs. If no networks appear, click Interface and then select the
appropriate wireless NIC interface.
7. Note the columns Signal and High Signal . How could this be used in a
site survey?
8. Click Graph 1 .
9. Click one of the APs displayed at the bottom of the screen. Allow
Vistumbler to accumulate data over several minutes. What information
is displayed on this graph?
10. Click Graph 2 .
11. Click another one of the APs displayed at the bottom of the screen.
Allow Vistumbler to accumulate data over several minutes. What
information is displayed on this graph? How is this different from the
previous graph?
12. Click No Graph to return to the previous screen.
13. Use the horizontal scroll bar to move to the right. Note the columns
Authentication, Encryption, Manufacturer, and Radio Type . How would
this information be useful to an attacker?
14. Use the horizontal scroll bar to move back to the far left.
15. In the left page, expand the information under Authentication . What
types are listed?
16. Expand the information under these types and note the information
given for the wireless LAN signals. What device does Mac Address point
to? How could this be useful to an attacker?
17. In the left page, expand the information under Encryption . What types
are listed? Which types are most secure? Which types are least secure?
18. Expand the information under these types and note the information
given for each WLAN.
19. Record the total number of different WLANs that you are able to detect,
along with the number of encryption types. Which type is most common?
20. Compile all the information from other students regarding the total
number of different WLANs and the number of encryption types. Does it
surprise you? Why or why not?
21. One of the features of Vistumbler is its ability to use audio and textto-
speech information so that the location and strength of WLANs can
be detected without the need to constantly monitor the screen. Be sure
that the speakers on the laptop computer are turned on.
22. Click Options .
23. Click Speak Signals . Now Vistumbler will speak the percentage of signal
strength.
24. Now carry the laptop away from the AP and note the changes. How
would this be helpful to an attacker?
25. Close Vistumbler.
26. Close all windows.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started