Advertisement
Guest User

Untitled

a guest
Mar 22nd, 2019
69
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.79 KB | None | 0 0
  1.  
  2.  
  3.  
  4. INTRO- What is the project about.
  5. what the two teams have done
  6. 3- ROGUE ACCESS POINT
  7. 3 - Main Script
  8. Basically our team is focusing on the main script which scans the access points in the network and run a series of tests to make sure that the network is secure.
  9. It will check if the mac address is in the trusted file and check it's signal of strenght and it's SSID. The script will run on boot, if the scan is positive, the script will continue to run every 5 mins.
  10. And If the access point fails our tests, the scan is negative and we will alert the user with a mobile notification saying that the network may not be secure.
  11. Proof of Concept
  12.  
  13. Conclusions
  14. We will improve it:
  15. 1) We can make the trusted list more secure by uploading the txt file to a beaglebone and updating it via FTP.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement