Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Write entire project ( 1 5 0 0 0 ) word - send me on 2 4 / 0 6 / 2 0 2 4

Write entire project (15000) word - send me on 24/06/2024
***Using Tp-link WiFi adapter (AC1300) IEEE 802.11
Abstract
***Please rewrite the following
1. Introduction
2. In Literature Review
... Background
... WN security Protocols
... Security Policies
... Mitigation Strategies
... please fill the gap of on securing Wireless Networks
***Write and implement everything from here
3. Methodology
...change everything thing
Write on research on onions layers, explain and how it fits to this project.
... framework
... specific method for pen test ( OWASP, EC council, SAN etc), write / explain only one method which is suitable for this project and why?
...experiment approach
Reconnaissance, network scanning, exploitation, post exploitation.
.. Reporting
.. contingency plan for experiment
.. timeline of project approach
4. Design and implementation
...experiment setup of laboratory (topology) and requirements.
...gather AP information before cracking
... cracking WEP (chop-chop attack and ARP replay attack) accessing password of WiFi adapter
... cracking WPA/WPA2( Brute force attack) capturing Handshake using wireshark tool .. accessing password.
...Exploiting Vulnerabilities in WEP, WPA/WPA2.
***the second point was....
Accessing password is one step,
The Second step was Please get access into the system after cracking password that can see personal information like messages, mails, files etc..
..exploitation
...Analysis
....make configuration or implementation on secure/ protect the WiFi adapter and explain what methods are used.
...please fill /write the gap what you found else in the project
...Results and Discussions
...conclusion
...future work
...reflection
...references
***Make video of the entire process while using VM Kali
***Screenshot images of implementation with time stamps and other images required in LR and methodology
give me commands, and complete an procedure and also versions of the software i need to use and im unable to continue with chop chop attack soo give me commands and help me

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Instant Reference

Authors: Gruber, Martin Gruber

2nd Edition

0782125395, 9780782125399

More Books

Students also viewed these Databases questions