Passively Monitoring a Wireless Network
docx
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
370
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by EarlFieldManatee30
Nicholas Laughlin
ITT-370
03 September 2023
Professor Lisa Gasko
Passively Monitoring a Wireless Network
Downloaded Wireshark on my computer.
Unsecured websites that were visited were crunchyroll.com, youtube.com, and the gcu main website.
Secured websites visited were YouTube and GCU main website.
Picked the IP address that was given to me from the command prompt and then looked up a common destination IP address on the two and begun to compare them.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Before I started to capture packets in Wireshark, I used the command prompt to find the
IP address for my computer on both networks. My home network IP address is 10.0.0.127 and the public IP address for my computer connected to the Walmart public Wi-Fi is 192.168.96.2. Comparing the two different captures is quite hard to understand and I feel like I am not
experience enough to go in exact details on the differences. I did some research on how to view
the packets easier by going to view then name resolution, and finally clicking on resolve network address and resolve transport address. From using the different views, I was able to visualize what websites were being accessed and on the secure Wi-Fi I was able to see the different devices on my network such as my cell phone, televisions, finally the Ring cameras for my front door all capturing different packets. On the unsecured Wi-Fi also known as public Wi-Fi that was being used was not showing my name with the IP address that was assigned with my computer but one thing that was noticeable was the more color-coded traffic that was showing on the public Wi-Fi. Every wireless network has the unspoken rule of what the network should have in order
to stay within the security aspects and not have the ability of be vulnerable to outsiders. The Key components to a wireless network are adapters, routers, access points, antennas, and
repeaters. All components need to have some type of security function for the network and wireless security is critically important for protecting wireless network and services from unwanted attacks, breaches, and access. To protect the wireless network is to have strong and secure authenticating procedures, encryption protocols and access control polices. Wi-Fi Protected Access 3 (WPA3) is the latest security protocol that offers security features such as stronger encryption, protection against dictionary attacks and individual data encryption. Security aspect that I would enforce is everyone who uses wireless networks use a virtual private network (VPN) when using any type of wireless network because VPN can encrypt a user’s internet connection by concealing a user’s IP address with a virtual IP address that is assigned to the user’s traffic.
Ways that you can minimize the risk to your wireless network are simple by changing your default password and the default SSID. Restrict access to unauthorized users by filtering the media access control (MAC) address. Using the updated firmware on the router to ensure security patches and big are fixed for things that could be out of your control. Installing a firewall by using a host-based firewall by adding a layer of protection to the data on the computer. Using a VPN to access the internet when using public Wi-Fi, some are free to use. I would recommend staying away from the internet in general because you always have the risk of attackers but I believe that if you do not have the equipment or software talked about earlier then that is something that should be mandatory in order to connect to the wireless local area networks (WLAN).