The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
How Secure is Your Home Network Poster
1. How Secure is Your
Home Network
INTRODUCTION
More than 300 000 home and small office (SOHO) routers were found to have been compromised or
hijacked by hackers. This security breach was discovered by some security researchers at team cymru,
though not yet clear what the overall intention of the hackers is, it has been discovered that the nature
of the hijack is similar to one that had occurred in Poland where internet bankers had been targeted by
the hackers introducing malicious software in order to gain online banking login details. There are more
risks and threats that a home network can be exposed to once it router has been compromised e.g.
cyber bullying, DOS attacks, Man in the middle attacks, and Viruses. This project is going to investigate
a home networks vulnerabilities, the types of threats that it can be exposed to once a hacker gets
access to the network and things home network users can do to improve security of their network.
METHODOLOGY
Assemble Penetration testing tools. For this case study Kali Linux which is suite of penetration testing tools will be used. Kali Linux
will be installed to a SD card and will be run via the Raspberry Pi.
Attempt to crack the different wireless authentication password types i.e. WEP, WAP and WAP2 using war driving tools such Air-crack,
Netstumbler, or Fern-WiFi-Cracker.
Record the results and difficulty level of cracking WEP, WAP and WAP2.
Enumerate Live hosts on the network using Nmap on Kali Linux.
Scan for Vulnerabilities on the devices / hosts including the router itself tools such as Nessus and Nikto will be used.
Attempt to carry out exploits on the devices based on the vulnerabilities found.
Record exploits and ease of access.
Compile a report and suggest security measures based on findings.
EXPECTED RESULTS
To expose vulnerabilities that exit within the home network
including wireless authentication
To exploit a known or discovered vulnerability to gain remote
Access to a PC or Device, then obtaining the login password by
carrying out a password attack.
To exploit a known or discovered vulnerability to gain remote
access to a PC with a web-cam and operate the web-cam
remotely e.g. take a snapshot
CONCLUSION
Due to a rise in internet based (e-everything)
e.g. e-business, e-banking, e-social, e-education
and more there has also been a rise
in cyber-crimes such as identity theft, cyber
bullying, distributed denial of service (DDOS)
attacks where a compromised system can be
used as a botnet, etc. it is important that home
network users play their part in ensuring
network security by following the safe
computer practices guidelines, as a
compromised system can lead to other
systems being compromised.
NAME: Bobby Sibiya
SID: 1023007
BSc (Hons) Information Security and Forensic Computing
Email: bobby.sibiya@student.anglia.ac.uk