National Repository of Grey Literature 10 records found  Search took 0.01 seconds. 
Wireless communication analysis using software defined radio
Štrajt, Martin ; Štůsek, Martin (referee) ; Pokorný, Jiří (advisor)
The work deals with the use of software-defined radio as a probe for monitoring the operation of wireless communication according to the IEEE 802.11a/g standard. In the theoretical introduction, the concept of software-defined radio as a hardware device with software programmable circuits enabling the transmission or reception of signals in theoretically any frequency band is introduced. The introduction also contains adescription of selected devices and the IEEE 802.11 protocol with its most used additionsand modulations. In the first part of the practical part of the work, wireless communication is capturedusing a wireless network card in monitoring mode. The intercepted communication was decrypted and this decrypted traffic was compared with the data captured by the probe within the network. These results then served as acomparative basis for software-defined radio capturing. The focus of this work is to verify the capabilities of software-defined radio and its use for sniffing wireless communicationin the frequency band 2.4 GHz and 5 GHz. The attempt to use a software-defined radio here results from the scalability and adaptability that a wireless card cannot offer due to fixed hardware parameters. LimeSDR mini, LimeSDR and bladeRF 2.0 devices were used for capture. First, the configuration of the operating system, the installation of drivers and programs for control and work with selected devices are described. After verifying the functionality of the software-defined radio, a model of a signal decoder with the parameters of the IEEE 802.11g standard captured from the radio spectrum was put into operation. Finally, the data streams captured by the software-defined radio and the wireless network card were compared side by side. The results showed that the software-defined radio in the used configuration captures only a part of the total volume of transmitted frames.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Wireless communication analysis using software defined radio
Štrajt, Martin ; Štůsek, Martin (referee) ; Pokorný, Jiří (advisor)
The work deals with the use of software-defined radio as a probe for monitoring the operation of wireless communication according to the IEEE 802.11a/g standard. In the theoretical introduction, the concept of software-defined radio as a hardware device with software programmable circuits enabling the transmission or reception of signals in theoretically any frequency band is introduced. The introduction also contains adescription of selected devices and the IEEE 802.11 protocol with its most used additionsand modulations. In the first part of the practical part of the work, wireless communication is capturedusing a wireless network card in monitoring mode. The intercepted communication was decrypted and this decrypted traffic was compared with the data captured by the probe within the network. These results then served as acomparative basis for software-defined radio capturing. The focus of this work is to verify the capabilities of software-defined radio and its use for sniffing wireless communicationin the frequency band 2.4 GHz and 5 GHz. The attempt to use a software-defined radio here results from the scalability and adaptability that a wireless card cannot offer due to fixed hardware parameters. LimeSDR mini, LimeSDR and bladeRF 2.0 devices were used for capture. First, the configuration of the operating system, the installation of drivers and programs for control and work with selected devices are described. After verifying the functionality of the software-defined radio, a model of a signal decoder with the parameters of the IEEE 802.11g standard captured from the radio spectrum was put into operation. Finally, the data streams captured by the software-defined radio and the wireless network card were compared side by side. The results showed that the software-defined radio in the used configuration captures only a part of the total volume of transmitted frames.
Interception of network traffic
Fišer, Tomáš ; Vasilenko, Alexandr (advisor) ; Tyrychtr, Jan (referee)
The bachelor thesis deals with possibilities of security breaches of network communication and principles of its interception. The thesis is divided into two parts, the theoretical part, which contains the principles of computer networking and describes the methods of hacking into the network, and on the practical part, which demonstrates capturing of data using the methods described above. There is also shown the danger of using unencrypted protocols. Program called Ettercap was used for this demonstrations and for the interception of data was used program called Wireshark.
Monitoring and analysing network communication
Nikl, Lukáš ; Vasilenko, Alexandr (advisor) ; Masner, Jan (referee)
This thesis describes and explains network attacks and provides solutions how to defend against these threats. Each network attack is introduced in the theoretical part. This thesis characterizes individual signs of each attack and those attacks are divided into specific groups. The next part pursue the topic of defence against these network attacks. This thesis also provides advices, how to lower or even eliminate the attack from happening. In the last part there are practical experiments of chosen attacks performed by selected software.
Interception of Modern Encrypted Protocols
Marček, Ján ; Korček, Pavol (referee) ; Kajan, Michal (advisor)
This thesis deals with the introduction to the security mechanism.The procedure explains the basic concepts, principles of cryptography and security of modern protocols and basic principles that are used for information transmission network. The work also describes the most common types of attacks targeting the eavesdropping of communication. The result is a design of the eavesdropping and the implementation of an attack on the secure communication of the SSL protocol..The attacker uses a false certificate and attacks based on poisoning the ARP and DNS tables for this purpose. The thesis discusses the principles of the SSL protocol and methodology of attacks on the ARP and DNS tables.
Nasal Fixation by Methamphetamine Users
VĚTROVSKÁ, Lucie
The diploma thesis theme, which I have chosen, Addiction to the nasal use of pervitin, is based on my long-term interest in this subject.One of the factors that may be important in the study of any drug problem is the ritual. Rituals here may appear on several levels - it may contribute to the formation and maintenance of a dependency, in the application itself (creation of "lines" on the mirror, the use of identity cards, sniffing with a rolled banknote, etc.) and can take various forms (e.g., group or individual) (Holzbachova, 1999). For my thesis, I have chosen the method of qualitative research. The basic approach of qualitative research includes the grounded theory. The aim of the thesis is to analyze and describe the different aspects of ritual behavior of nasal drug users. The research question was to discover, which aspects of ritual occur in nasal drug users. As it is described in literature, all drug users ritualize the drug application to some extent. This represents stylized and routine behavior that occurs during drug use. There are situations, like the procurement of drugs, methods of taking, activities following the use of drugs and the ways to prevent the negative effects of drugs (Grund, 1993). During an interview, two of the interviewees said the word "ritual". Cyril considers it a ritual and the activities precede sniffing. These are activities associated with the hunt for the drug, the journey to the drug and the nervousness "before trip", which according to him is stronger than the feeling of drug application. Dana describes the application procedure as a ritual. However, she describes as ritualistic her behavior during the purchase of a sufficient supply of cigarettes for intoxication or when applying the drug on the toilet seat, wiping the toilet boards before the actual preparation of the drug for application. Although the other two interviewees did not use the word ritual in their answers directly, some ritualistic elements signaled a routine behavior in conducting the drugs process by them as well. In general, we assume that the thesis can contribute to the discussion about the ritual aspects of drug users. This work brings in new information about the rituals of nasal drug users. We anticipate publication in a professional periodical.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.