diplomsko delo
Jan Kvartič (Author), Marko Hölbl (Mentor), Žiga Podhostnik (Co-mentor)

Abstract

Vedno več naprav danes uporablja brezžično komunikacijo. Vendar to ne pomeni, da je komunikacija med vsemi varna, saj je v praksi težko zagotoviti popolno varnost. V diplomskem delu smo preučili, kako delujejo naprave za brezžično penetracijsko testiranje, se seznanili s frekvencami pod 1 GHZ, na katerih delujejo vsakodnevne naprave, in si podrobno pogledali, kako lahko odkrijemo ter izkoristimo varnostne pomanjkljivosti z različnimi vrstami napadov. Nato pa smo vse to uporabili še v praksi in izvedli zajem ter analizo podatkov in izpeljali dejanski napad. Prišli smo do zaključka, da je bila končna naprava ranljiva, saj so bili napadi uspešni. Proučili smo tudi, kako lahko te varnostne pomanjkljivosti odpravimo in kako se lahko zaščitimo pred nepooblaščenimi napadi.

Keywords

brezžična komunikacija;analiza signalov;ranljivosti;zaščita;zlonamerne naprave;diplomske naloge;

Data

Language: Slovenian
Year of publishing:
Typology: 2.11 - Undergraduate Thesis
Organization: UM FERI - Faculty of Electrical Engineering and Computer Science
Publisher: [J. Kvartič]
UDC: 004.7.056.5(043.2)
COBISS: 171258115 Link will open in a new window
Views: 52
Downloads: 6
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary title: Monitoring, analyzing, and attacking vulnerable devices with wireless penetration tools
Secondary abstract: An increasing number of devices today use wireless communication. However, this does not mean that communication between all of them is secure, as ensuring complete security is challenging in real-world scenarios. In the thesis work, we examined the functioning of wireless penetration testing devices, explored the frequencies under 1GHZ, on which everyday devices operate, and closely looked at how we can discover and exploit security vulnerabilities using various attack strategies. Then we applied all of this into practice, and conducted data capture and analysis procedures, and executed the actual attacks. The findings were intriguing, as the attacks were successful. We have come to the conclusion that the final device was vulnerable as the attacks were successful. We further discussed how these security vulnerabilities can be rectified and how one can protect against unauthorized attacks.
Secondary keywords: wireless communication;signal analysis;vulnerabilities;security;malicious devices;
Type (COBISS): Bachelor thesis/paper
Thesis comment: Univ. v Mariboru, Fak. za elektrotehniko, računalništvo in informatiko, Informatika in tehnologije komuniciranja
Pages: 1 spletni vir (1 datoteka PDF (VII, 42 f.))
ID: 19835121