Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now

Automated Jamming Attack Introduction: We are going to create an automated wifi-jammer to jam 2 out of 3 channels of a specified network. Requirements: 1. You should programming with bash. 2. Your program should be a shell program that runs in terminal/console. 3. The program should ask the user to perform the following operations: – Step 1: scan the wireless signals, – Step 2: choose a target network, – Step 3: choose a channel to jam. You probably need a loop to complete 2 jamming operations. Detailed requirements aredescribed in the following sections. Step 1 – Scanning Signals Recall the command to sniff all the wireless signals: airodump-ng –bssid –channel You need to plug this command in your program. Once the user chooses to scan the signals,this is the command your program needs to execute. Make the sniffing last for about 20 seconds before the program stops it. Show/Print out thesniffing result to the user. Step 2 – Choose Target Network It is important that the result list of sniffing containsthe ESSID of the target network. This step enables the user to specify a network for yourprogram to jam. Your program should immediately read through the scanning list and locate the network thatmatches the ESSID. Print out all the records related to this network. Hint: if nobody else is jamming, 3 records are expected since we have made the network runon 3 different channels. Step 3 – Choose Target Channel Once the user input the network ESSID, your programcan ask them to specify a channel that carries the network. This step requires your programto find out the specified channel in the print-out of step 2. Get the BSSID related tothe channel and send out adeauthentication broadcast using the following command, aireplay-ng –deauth 5 –a Print out, or open a new window to show the result of this deauthentication attack. Submission List 1. A zip file of your source code. Documentation is required. 2. An executable file of your program. 3. Include a file of details (readme.txt) about running your program in your submission.

Automated Jamming Attack

Introduction:

We are going to create an automated wifi-jammer to jam 2 out of 3 channels of a specified network.

 

Requirements:

1. You should programming with bash.

2. Your program should be a shell program that runs in terminal/console.

3. The program should ask the user to perform the following operations:

– Step 1: scan the wireless signals,

– Step 2: choose a target network,

– Step 3: choose a channel to jam.

You probably need a loop to complete 2 jamming operations. Detailed requirements aredescribed in the following sections.

Step 1 – Scanning Signals

Recall the command to sniff all the wireless signals:

airodump-ng –bssid<BSSID of AP> –channel <Channel Number><Interface>

You need to plug this command in your program. Once the user chooses to scan the signals,this is the command your program needs to execute.

Make the sniffing last for about 20 seconds before the program stops it. Show/Print out thesniffing result to the user.

 

Step 2 – Choose Target Network

It is important that the result list of sniffing containsthe ESSID of the target network. This step enables the user to specify a network for yourprogram to jam.

Your program should immediately read through the scanning list and locate the network thatmatches the ESSID. Print out all the records related to this network.

Hint: if nobody else is jamming, 3 records are expected since we have made the network runon 3 different channels.

Step 3 – Choose Target Channel

Once the user input the network ESSID, your programcan ask them to specify a channel that carries the network. This step requires your programto find out the specified channel in the print-out of step 2. Get the BSSID related tothe channel and send out adeauthentication broadcast using the following command,

aireplay-ng –deauth 5 a <BSSID of AP><Interface>

Print out, or open a new window to show the result of this deauthentication

attack.

 

Submission List

1. A zip file of your source code. Documentation is required.

2. An executable file of your program.

3. Include a file of details (readme.txt) about running your program in your submission.

Interested in a PLAGIARISM-FREE paper based on these particular instructions?...with 100% confidentiality?

Order Now