Agenda 01 02 03 Introduction problem Objective 04 system analysis 05 06 Network details Connected devices Security Type 11 Vulnerability scanning 7 9 8 10 12 Password Setting Ping Test Speed Test Open Ports checker 13 14 Conclusion Features
Introduction 1
Welcome to the Presentation for our Wi-Fi Scanner project. This comprehensive tool is designed to provide users with detailed insights into their wireless network environment. Our Wi-Fi Scanner offers a range of features aimed at enhancing network management, security, and performance. The primary functionalities of the Wi-Fi Scanner include: Router Details: Retrieve and display essential information about the router. Connected Devices: Identify and list all devices connected to the network, and block any device. Open Ports: Scan for and report open ports on any IP address or any domain name. Password Settings: Manage and secure Wi-Fi password setting.
Vulnerabilities: Detect potential security vulnerabilities within the network. Security Type: Determine and display the security protocol in use (e.g., WPA2, WPA3). Speed Test: Measure and report the network’s upload and download speeds. Ping Test: Perform a ping test to evaluate network latency and stability. This Presentation will guide you through each feature, explaining its purpose, functionality, and how to effectively utilize it to optimize your network's performance and security. Whether you are a network administrator or a tech-savvy home user, our Wi-Fi Scanner aims to provide the necessary tools to ensure your wireless network operates efficiently and securely.
problem 02
Context and Importance :- Wi-Fi networks are essential for connectivity but pose security risks. Cybercriminals exploit vulnerabilities to access data, disrupt services, and compromise privacy. Strong Wi-Fi security is vital to safeguard personal information and prevent unauthorized access to network resources. Problem Definition :- Protection of Personal Information: Personal data sent over unsecured networks is vulnerable to interception by malicious actors, potentially resulting in identity theft and financial harm. Network Integrity: Unauthorized network access can result in congestion, decreased performance, and enable malicious activities such as malware distribution. Compliance: Many industries, such as healthcare and finance, are obligated to maintain high levels of network security to safeguard sensitive data, as mandated by regulations like HIPAA and financial standards, to mitigate the risk of unauthorized access or data breaches. Wi-Fi security is vital for several reasons:-
Unauthorized Access : Wi-Fi networks can be easily accessed by attackers if default settings or weak passwords are used. Strong passwords and customized configurations are crucial to prevent unauthorized entry. Weak Security Protocols : Outdated security protocols like WEP and weak implementations of WPA are still prevalent in many networks, making them vulnerable to attacks like packet sniffing and brute force attacks. While modern protocols like WPA3 provide better security, they are not widely adopted. Upgrading to the latest security protocols is essential to mitigate these risks. Password Strength : A strong Wi-Fi password is vital to prevent unauthorized access. Weak passwords are vulnerable to guessing or cracking, emphasizing the importance of using strong, complex passwords for network security. Handshake Vulnerabilities : During the handshake process, which establishes connections between devices and networks, vulnerabilities can be exploited. Attackers may intercept and decrypt data, potentially leading to data breaches and unauthorized access. Device Management: Monitoring and managing all devices connected to a network is vital for security. Unknown or unauthorized devices could indicate a breach, highlighting the importance of effective device management for securing network access. Disconnecting Unauthorized Devices: It's vital to be able to disconnect unauthorized devices from the network to uphold security and integrity. Without this ability, networks remain vulnerable to ongoing exploitation by unauthorized users.
Objective 03
Project objectives: 1. Unauthorized access: Use strong passwords. Enable MAC address filtering. Disable SSID broadcasting. 2. Weak security protocols: Upgrade to WPA3. Disable WPS. 3. Password strength: Use strong passwords. Require unique passwords for all devices. Use a password manager. 4. Handshake vulnerabilities: Use a firewall. Keep your router firmware up to date. Avoid using public Wi-Fi networks. 5. Device management: Install security software on all devices. Keep your operating system and software up to date. Monitor your network traffic. 6. Disconnecting unauthorized devices: Use a router with a guest network. Disable remote administration. Change your router's default password.
system analysis 04
Tools • Django : This is a web framework written in Python that helps developers create web applications. It's used to structure the overall application and handle web requests and responses. • subprocess : This library allows you to execute shell commands and capture their output. It's used in several functions like scan_network to run the nmap command. • re: This library provides regular expression functionalities for searching and manipulating text. It's used in the parse_nmap_output function to parse the output of the nmap scan. • pythonping: This library helps you send ping requests to network devices and measure their response time. It's used in the ping_network function to perform a ping test. • speedtest : This library is specifically designed for measuring internet speed. The run_speed_test function utilizes this library to perform a speed test • random: The random library provides functionality for generating random integers, floating random, even random numbers from a specified range, and strong passwords. • string: The string library is used to provide combinations of characters (such as uppercase and lowercase letters, numbers, and symbols) to create strong passwords. The random library is used to randomly select these characters to generate unique passwords that are difficult to guess. • render: The render library will be used in Python to bind Python data to an HTML template to display to a web user. It is an essential part of the Django framework, as it is used to deliver HTTP res ponses that contain dynamic HTML content.
• Nmap: · Identifying Connected Devices: Nmap can scan a network and identify all the devices connected to it, including computers, servers, routers, and IoT devices. This helps network administrators maintain an accurate inventory of their network assets. · Identifying Running Services: Nmap can determine the services running on each device, such as web servers, email servers, database servers, and file sharing services. This helps identify potential security risks and understand the overall network infrastructure. · Detecting Known Vulnerabilities: Nmap can scan for known vulnerabilities in network devices and services. This helps identify weaknesses that could be exploited by attackers. · Identifying Open Ports: Nmap can scan for open ports on devices, indicating potential access points for attackers. This information is crucial for hardening network defenses.. · Identifying Network Issues: Nmap can help diagnose network connectivity problems, identify unreachable devices, and pinpoint the source of network disruptions. ·
Network details 05
OUTPUT Network type refers to how the network is configured. 1. Network Type : Radio type refers to the wireless communication standard being used. 2. Radio Type : 3. Authentication: Authentication refers to the method used to verify the identity of devices attempting to connect to the network. Cipher refers to the type of encryption used to secure data transmitted over the network. 4. Cipher:
9. Transmit: RateTransmit rate indicates the speed at which the device sends data to the router, also measured in megabits per second (Mbps). 10. Signal: Signal refers to the strength of the connection between the device and the router, typically measured in decibels (dBm) or as a percentage. A strong signal means a more stable and faster connection. 11. Profile: Profile refers to the network settings stored on the device. You can set up multiple profiles for different networks you connect to regularly. 12. Hosted Network Status: Hosted network status indicates whether the device is acting as an access point to allow other devices to connect through it. Connection mode determines how the device connects to the network. Band refers to the frequency range of the wireless network. 6. Band: Channel refers to a specific frequency within the selected band. Choosing the right channel can reduce interference and improve performance. 7. Channel : 8. Receive Rate: Receive rate indicates the speed at which the device receives data from the router. 5. Connection Mode:
Connected Devices 06
How does the WiFi Scanner work? Functions of the WiFi Scanner: Scanning the wireless network and discovering connected devices. Displaying the IP addresses and MAC addresses of the devices. Ability to disconnect unauthorized devices. Scanning Process: -When pressing the "Start Scan" button, the scanner examines the WiFi network. - It displays a list of connected devices. - Upon detecting an unauthorized device, pressing the "Block" button redirects to the admin page. - On the admin page, you can select the device you want to remove.
Security Importance of Knowing Connected Devices: Security and Protection: - Detecting unknown devices and preventing them from connecting to the network. - Protecting the network from breaches and preventing data theft. Network Management: - Identifying devices that consume a large amount of bandwidth. - Improving network performance by effectively managing these devices. - Better planning for internet distribution at home or in the office. Usage Control: - Disconnecting devices that consume bandwidth undesirably. - Setting time limits for device connections to the WiFi, such as regulating children's usage hours. Potential Risks of Not Knowing Connected Devices : Spying: - Spying on your online communications and monitoring your activities. - Stealing your private conversations and sensitive information. Data Theft: - Intruders can connect to your WiFi network and steal your personal data, such as passwords and financial information. - Using this data to steal your identity or commit other crimes
Malware: - Spreading malware to your devices, causing damage or stealing data. - Taking control of your devices remotely using malware. Slowing Down Internet Speed: - Using a large amount of bandwidth, resulting in slower internet speeds. - Difficulty browsing the web, streaming videos, or playing online games. Network Disruption: Disabling the WiFi network, leading to the inability to connect to the internet from any device connected to the network.
Security Type 07
output
Speed Test 08
The Feature Includes Calculating Two Basic Speeds: The speed at which data is uploaded from the device to the internet. The speed at which data is downloaded from the internet to the device. Download Speed: Upload Speed:
How To Start Test of Speed: Go To Speed Test Page And Press Start Scan This is output of Download Speed This is output of Upload Speed
How the Speed Test Feature Works: Measuring download speed by downloading a test file from a remote server. Measuring upload speed by uploading a test file to a remote server. Download speed is calculated using the formula: Download Speed = File Size / Time Taken . Displaying the results to the user in a clear and easy-to-understand manner.
Main Advantages of the Feature: Providing valuable information to users about the quality of their internet connection. Helping detect any issues with the network or internet connection. Allowing multiple tests for comparison and tracking over time. Benefits: Performance Improvement: Users can identify if there are issues with their internet speed. Diagnostics: Users can use the results to improve their network performance or troubleshoot connection issues.
Ping Test 09
What is ping test It is a tool that is used to determine if the device is on an accessible network or not And to measure its response time between two devices over the network To test and verify the existence of IP for a specific need and control the acceptance or rejection of requests in the network management Measuring time for ping test: The time taken to reach the desired destination and receive a response is measured And in more than one measure
How To Start Test of Ping: Go To Ping Test Page Average of ping Packet Loss Max Ping Min Ping And Press Test
Password Setting 10
Password and Network Security 1. Testing the Current Password Strength Functionality: The system asks the user to enter the current network password. It analyzes the password and evaluates its strength. It informs the user whether the password is weak, or strong. Importance: Helps users understand the security level of their current network password. Provides recommendations to improve network security if the password is weak.
3. Redirecting to the Admin Page to Change the Password Functionality: Provides a direct link to access the router's settings page. Makes it easy for the user to change the password quickly and efficiently. Importance: Simplifies the process of changing the password and ensures the new password is applied immediately. Provides instant protection to the network after changing the password. 2. Generate Strong Password Functionality: If the current password is weak, the system recommends a new strong password. it uses modern security standards : sufficient length, uppercase and lowercase letters, numbers, and symbols. Importance: Ensures the suggested password is hard for attackers to guess.
OPen Ports Checker 11
Open ports Open ports are network ports on a device that allow the sending and receiving of data between devices on a network. How it works: A WiFi scanner scans the devices connected to the network. It searches for open ports on each device. If an open port is found, the device responds with a positive signal. It displays a list of open ports and identifies the available services.
The importance of knowing open ports: 1 - Security Verification: Checking open ports to detect security vulnerabilities that could be exploited by attacks. 2-Network Exploration: Used to discover new devices and services on the network. 3-Network Troubleshooting: Used to identify devices experiencing connectivity issues and resolve them more efficiently.
Types of ports, their functions, and potential attacks: 1) Port 80 (HTTP - Hypertext Transfer Protocol): Function: Used for browsing the internet (transferring unencrypted web pages) Potential Attacks: 1. HTTP Flood Attack: Sending a large volume of requests to overwhelm the server. 2. Cross-Site Scripting (XSS): Injecting malicious code into web pages. 2) Port 443 (HTTPS - HTTP Secure): Function: Used for secure internet browsing (data encryption). Potential Attacks: 1. SSL/TLS Vulnerabilities: Exploiting weaknesses in encryption protocols. 2. Man-in-the-Middle Attack: Attempting to decrypt the connection and steal data.
Vulnerability Scanning 12
Definition of vulnerabilities: Weaknesses in a computer system or network exploitable by attackers to access, disable, or steal data. Causes include software bugs, incorrect configurations, or design flaws. Code Overview : Purpose: The provided code scans a network to identify vulnerabilities using the `nmap` library in Python.
Function `workness`: Handles HTTP requests to scan a network for vulnerabilities. POST Request: Scans the network, prints, and displays vulnerabilities on an HTML page. GET Request: Displays the HTML page without data. The output from the vulnerabilities:
Importance of Identifying Vulnerabilities: How to strengthen Vulnerability: 1. Protect Sensitive Data 2. Prevent Network Attacks 3. Regulatory Compliance Adhere to standards 4. Protection from Malware 5. Protect Connected Devices 1. Software Updates and Patches 2. Encryption 3. Continuous Monitoring 4. Awareness and Training 5. Antivirus and Security Software
CONCLUSION 13
In conclusion, the Wi-Fi Scanner project presents a comprehensive and user-friendly solution for managing and securing wireless networks. This innovative tool addresses the critical challenges faced by users today, including limited network visibility, security vulnerabilities, and performance issues. The Wi-Fi Scanner empowers users by offering a wide range of functionalities: Detailed Network Insights: Gain a comprehensive understanding of your network with information on router details and all connected devices. Enhanced Security: Identify and mitigate potential security threats through vulnerability scans and password strength management. Optimized Performance: Diagnose and resolve performance bottlenecks to ensure a smooth and efficient Wi-Fi experience. Furthermore, the Wi-Fi Scanner prioritizes user experience with its intuitive interface, making advanced network management accessible for everyone. This proactive approach empowers users to identify and address network issues before they disrupt their digital lives. By leveraging a combination of Python, HTML, CSS, and Django, the Wi-Fi Scanner offers a robust and secure platform for managing wireless networks. The integration of various network scanning tools within a Kali Linux environment ensures comprehensive analysis.
Features 14
Additional features: 1. Real-time Network Monitoring. 2. Network Map Visualization. 3. Customizable Alerts and Notifications. 4. Remote Access and Management. 5. Device Profiling and Identification. 6 . Bandwidth Usage Analysis. 7. Integration with Security. Standards and Protocols. 8. Historical Data and Reporting. 9 . Multi-platform Support. 10. User-friendly Interface and Documentation.