National Repository of Grey Literature 11 records found  1 - 10next  jump to record: Search took 0.01 seconds. 
Multi-protocol sniffer and analyzer
Lukáš, Vojtěch ; Zeman, Kryštof (referee) ; Krajsa, Ondřej (advisor)
The subject of this thesis is the design of a device that captures Bluetooth Low Energy or IEEE 802.15.4 frames and sends them via Ethernet interface to a computer for further analysis using Wireshark. The device is based on the CC2652RB microchip from Texas Instruments, which is accompanied by WIZnet W5500 Ethernet controller. This thesis describes software and hardware aspects of said device, furthermore it briefly mentions a custom designed Wireshark dissector. In addition, this thesis contains a quick handbook for Texas Instruments microcontrollers software development.
Wireless communication analysis using software defined radio
Štrajt, Martin ; Štůsek, Martin (referee) ; Pokorný, Jiří (advisor)
The work deals with the use of software-defined radio as a probe for monitoring the operation of wireless communication according to the IEEE 802.11a/g standard. In the theoretical introduction, the concept of software-defined radio as a hardware device with software programmable circuits enabling the transmission or reception of signals in theoretically any frequency band is introduced. The introduction also contains adescription of selected devices and the IEEE 802.11 protocol with its most used additionsand modulations. In the first part of the practical part of the work, wireless communication is capturedusing a wireless network card in monitoring mode. The intercepted communication was decrypted and this decrypted traffic was compared with the data captured by the probe within the network. These results then served as acomparative basis for software-defined radio capturing. The focus of this work is to verify the capabilities of software-defined radio and its use for sniffing wireless communicationin the frequency band 2.4 GHz and 5 GHz. The attempt to use a software-defined radio here results from the scalability and adaptability that a wireless card cannot offer due to fixed hardware parameters. LimeSDR mini, LimeSDR and bladeRF 2.0 devices were used for capture. First, the configuration of the operating system, the installation of drivers and programs for control and work with selected devices are described. After verifying the functionality of the software-defined radio, a model of a signal decoder with the parameters of the IEEE 802.11g standard captured from the radio spectrum was put into operation. Finally, the data streams captured by the software-defined radio and the wireless network card were compared side by side. The results showed that the software-defined radio in the used configuration captures only a part of the total volume of transmitted frames.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Wireless communication analysis using software defined radio
Štrajt, Martin ; Štůsek, Martin (referee) ; Pokorný, Jiří (advisor)
The work deals with the use of software-defined radio as a probe for monitoring the operation of wireless communication according to the IEEE 802.11a/g standard. In the theoretical introduction, the concept of software-defined radio as a hardware device with software programmable circuits enabling the transmission or reception of signals in theoretically any frequency band is introduced. The introduction also contains adescription of selected devices and the IEEE 802.11 protocol with its most used additionsand modulations. In the first part of the practical part of the work, wireless communication is capturedusing a wireless network card in monitoring mode. The intercepted communication was decrypted and this decrypted traffic was compared with the data captured by the probe within the network. These results then served as acomparative basis for software-defined radio capturing. The focus of this work is to verify the capabilities of software-defined radio and its use for sniffing wireless communicationin the frequency band 2.4 GHz and 5 GHz. The attempt to use a software-defined radio here results from the scalability and adaptability that a wireless card cannot offer due to fixed hardware parameters. LimeSDR mini, LimeSDR and bladeRF 2.0 devices were used for capture. First, the configuration of the operating system, the installation of drivers and programs for control and work with selected devices are described. After verifying the functionality of the software-defined radio, a model of a signal decoder with the parameters of the IEEE 802.11g standard captured from the radio spectrum was put into operation. Finally, the data streams captured by the software-defined radio and the wireless network card were compared side by side. The results showed that the software-defined radio in the used configuration captures only a part of the total volume of transmitted frames.
Interception of network traffic
Fišer, Tomáš ; Vasilenko, Alexandr (advisor) ; Tyrychtr, Jan (referee)
The bachelor thesis deals with possibilities of security breaches of network communication and principles of its interception. The thesis is divided into two parts, the theoretical part, which contains the principles of computer networking and describes the methods of hacking into the network, and on the practical part, which demonstrates capturing of data using the methods described above. There is also shown the danger of using unencrypted protocols. Program called Ettercap was used for this demonstrations and for the interception of data was used program called Wireshark.
Monitoring and analysing network communication
Nikl, Lukáš ; Vasilenko, Alexandr (advisor) ; Masner, Jan (referee)
This thesis describes and explains network attacks and provides solutions how to defend against these threats. Each network attack is introduced in the theoretical part. This thesis characterizes individual signs of each attack and those attacks are divided into specific groups. The next part pursue the topic of defence against these network attacks. This thesis also provides advices, how to lower or even eliminate the attack from happening. In the last part there are practical experiments of chosen attacks performed by selected software.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.

National Repository of Grey Literature : 11 records found   1 - 10next  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.