Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Project 9-1: Viewing WLAN Security Information with Vistumbler Vistumbler can be used to display the security information that is beaconed out from WLANs. Note that

Project 9-1: Viewing WLAN Security Information

with Vistumbler

Vistumbler can be used to display the security information that is beaconed

out from WLANs. Note that Vistumbler does not allow you to crack any

WLANs but instead only displays information. In this project, you will use

Vistumbler to view this information. This project works best when you are in

an area in which you can pick up multiple WLAN signals.

1. Use your web browser to go to www.vistumbler.net.

The location of content on the Internet may change without warning.

If you are no longer able to access the program through the

above URL, use a search engine and search for Vistumbler.

2. Click EXE Installer (Mirror).

3. Follow the prompts to download and install Vistumbler.

4. If the program does not start after the installation is complete, launch

Vistumbler.

5. If necessary, expand the window to full screen.

6. Click Scan APs. If no networks appear, click Interface and then select the

appropriate wireless NIC interface.

7. Note the columns Signal and High Signal . How could this be used in a

site survey?

8. Click Graph 1 .

9. Click one of the APs displayed at the bottom of the screen. Allow

Vistumbler to accumulate data over several minutes. What information

is displayed on this graph?

10. Click Graph 2 .

11. Click another one of the APs displayed at the bottom of the screen.

Allow Vistumbler to accumulate data over several minutes. What

information is displayed on this graph? How is this different from the

previous graph?

12. Click No Graph to return to the previous screen.

13. Use the horizontal scroll bar to move to the right. Note the columns

Authentication, Encryption, Manufacturer, and Radio Type . How would

this information be useful to an attacker?

14. Use the horizontal scroll bar to move back to the far left.

15. In the left page, expand the information under Authentication . What

types are listed?

16. Expand the information under these types and note the information

given for the wireless LAN signals. What device does Mac Address point

to? How could this be useful to an attacker?

17. In the left page, expand the information under Encryption . What types

are listed? Which types are most secure? Which types are least secure?

18. Expand the information under these types and note the information

given for each WLAN.

19. Record the total number of different WLANs that you are able to detect,

along with the number of encryption types. Which type is most common?

20. Compile all the information from other students regarding the total

number of different WLANs and the number of encryption types. Does it

surprise you? Why or why not?

21. One of the features of Vistumbler is its ability to use audio and textto-

speech information so that the location and strength of WLANs can

be detected without the need to constantly monitor the screen. Be sure

that the speakers on the laptop computer are turned on.

22. Click Options .

23. Click Speak Signals . Now Vistumbler will speak the percentage of signal

strength.

24. Now carry the laptop away from the AP and note the changes. How

would this be helpful to an attacker?

25. Close Vistumbler.

26. Close all windows.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Microsoft SQL Server 2012 Unleashed

Authors: Ray Rankins, Paul Bertucci

1st Edition

0133408507, 9780133408508

More Books

Students also viewed these Databases questions