

(For example: ssh In one of your SSH terminals, SSH to the node that you have designated as Bob, as the "root" user. In one of your SSH terminals, SSH to the node that you have designated as the AP, as the "root" user.In other configurations (using a different node as the AP), the other nodes may not all be in range of the AP. Important note: if you are using the outdoor testbed on ORBIT, due to the physical layout of nodes it is recommended to use node1-4 as the AP. In this experiment, Mallory will attempt to passively sniff communications between Alice and Bob. Of the four nodes in your group, designate one node as the access point (AP), one node as Alice, one node as Bob, and one node as Mallory.
Network ch 11 mac address sniffer windows#
Then, open six terminal windows and SSH to your testbed console ("", "", or "") in each one. Wait a few minutes for your nodes to boot. Whereas if using the four nodes on outdoor, you would run

For example, if using those four nodes on WITest, run When the image has been loaded onto the nodes, turn them on. Omf-5.4 load -i wifi-experiment.ndz -t , Alternatively, if you are on outdoor and using node1-2, node1-3, node1-4, and node1-5, run: (note that there are no spaces in between the commas and the nodes names in the command above). For example, if you are on WITest and using node22, node23, node18, and node19, run: Next, load the wifi-experiment.ndz disk image onto all the nodes in your group. Then, resume with the regular instructions from Open SSH sessions. If you are using sb4: Follow the modified instructions to set up the testbed. If any of these are not available, you can substitute other Atheros 9xxx-equipped nodes that are available. In the instructions that follow, we use either node22, node23, node18, and node19 on the WITest testbed node1-2, node1-3, node1-4, and node1-5 on the ORBIT outdoor testbed or node1-3, node1-4, node1-5, and node1-6 on the ORBIT outdoor testbed. mine is "geni-ffund01".)įor this experiment, we will need a group of four neighboring nodes that are available and have an Atheros 9xxx wireless card. (Your GENI wireless username is typically your GENI username, prefixed by "geni-", e.g. "" for WITest, "" for outdoor on ORBIT, "" for sb4 on ORBIT) with your GENI keys and using your GENI wireless username. You can also use the "sb4" testbed at ORBIT, with some modifications to the instructions.Īt your reserved time, SSH to your testbed console (e.g. To run this experiment, you must have a current reservation on the "outdoor" testbed at ORBIT or on the WITest testbed. However, if the attacker has captured the 4-way handshakes between AP and client when the client associates AND knows the WPA key, then the attacker can decrypt user traffic: In a WiFi network protected by WPA, the data is encrypted, and even with the WPA key the attacker cannot decrypt it: 2103, is highlighted in the two screenshots above.) In a WiFi network protected by WEP, the data is encrypted:īut if the attacker finds out the WEP key, she can decrypt it: We observe that with an open WiFi network, a passive sniffer can read any traffic sent over the network: (Alternatively, you can use "sb4" testbed at ORBIT, with some modifications to the instructions.) Results Finally, you must have reserved time on the WITest testbed, or the "outdoor" testbed at ORBIT, and you must run this experiment during your reserved time. The project lead of the project you belong to must have enabled wireless for the project.

You should have already uploaded your SSH keys to the portal. To reproduce this experiment on GENI, you will need an account on the GENI Portal, and you will need to have joined a project. This experiment uses wireless resources, and you can only use wireless resources on GENI during a reservation. It should take about 120 minutes to run this experiment, but you will need to have reserved that time in advance. You should do this before your reservation on the wireless testbed.
Network ch 11 mac address sniffer install#
You will have to download and install Wireshark to run this experiment. In this experiment, we will observe the level of confidentiality provided by three kinds of WiFi networks - an open WiFi network, a WEP network, and a WPA network.

Menu Passive sniffing in 802.11 networks Fraida FundĠ5 April 2018 on wireless, security, education, 802.11
