SlideShare a Scribd company logo
1 of 1
How Secure is Your 
Home Network 
INTRODUCTION 
More than 300 000 home and small office (SOHO) routers were found to have been compromised or 
hijacked by hackers. This security breach was discovered by some security researchers at team cymru, 
though not yet clear what the overall intention of the hackers is, it has been discovered that the nature 
of the hijack is similar to one that had occurred in Poland where internet bankers had been targeted by 
the hackers introducing malicious software in order to gain online banking login details. There are more 
risks and threats that a home network can be exposed to once it router has been compromised e.g. 
cyber bullying, DOS attacks, Man in the middle attacks, and Viruses. This project is going to investigate 
a home networks vulnerabilities, the types of threats that it can be exposed to once a hacker gets 
access to the network and things home network users can do to improve security of their network. 
METHODOLOGY 
 Assemble Penetration testing tools. For this case study Kali Linux which is suite of penetration testing tools will be used. Kali Linux 
will be installed to a SD card and will be run via the Raspberry Pi. 
 Attempt to crack the different wireless authentication password types i.e. WEP, WAP and WAP2 using war driving tools such Air-crack, 
Netstumbler, or Fern-WiFi-Cracker. 
 Record the results and difficulty level of cracking WEP, WAP and WAP2. 
 Enumerate Live hosts on the network using Nmap on Kali Linux. 
 Scan for Vulnerabilities on the devices / hosts including the router itself tools such as Nessus and Nikto will be used. 
 Attempt to carry out exploits on the devices based on the vulnerabilities found. 
 Record exploits and ease of access. 
 Compile a report and suggest security measures based on findings. 
EXPECTED RESULTS 
To expose vulnerabilities that exit within the home network 
including wireless authentication 
To exploit a known or discovered vulnerability to gain remote 
Access to a PC or Device, then obtaining the login password by 
carrying out a password attack. 
To exploit a known or discovered vulnerability to gain remote 
access to a PC with a web-cam and operate the web-cam 
remotely e.g. take a snapshot 
CONCLUSION 
Due to a rise in internet based (e-everything) 
e.g. e-business, e-banking, e-social, e-education 
and more there has also been a rise 
in cyber-crimes such as identity theft, cyber 
bullying, distributed denial of service (DDOS) 
attacks where a compromised system can be 
used as a botnet, etc. it is important that home 
network users play their part in ensuring 
network security by following the safe 
computer practices guidelines, as a 
compromised system can lead to other 
systems being compromised. 
NAME: Bobby Sibiya 
SID: 1023007 
BSc (Hons) Information Security and Forensic Computing 
Email: bobby.sibiya@student.anglia.ac.uk

More Related Content

What's hot

Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Network Security
Network SecurityNetwork Security
Network SecurityManoj Singh
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0 Arjunsinh Sindhav
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
Internet Security
Internet SecurityInternet Security
Internet Securitymjelson
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security IssuesAfreenYousaf
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer securitySoundaryaB2
 

What's hot (20)

internet security
internet securityinternet security
internet security
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security
Computer securityComputer security
Computer security
 
Network Security
Network SecurityNetwork Security
Network Security
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Portfolio 7
Portfolio 7Portfolio 7
Portfolio 7
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
 

Viewers also liked

мы теперь не просто дети, мы теперь ученики!
мы теперь не просто дети, мы теперь   ученики!мы теперь не просто дети, мы теперь   ученики!
мы теперь не просто дети, мы теперь ученики!GALINA kOSHKINA
 
Master your cloud with MYCLOUD CONTROL
Master your cloud with MYCLOUD CONTROLMaster your cloud with MYCLOUD CONTROL
Master your cloud with MYCLOUD CONTROLHCL Technologies
 
Especialização em Engenharia de Ferrovias
Especialização em Engenharia de FerroviasEspecialização em Engenharia de Ferrovias
Especialização em Engenharia de FerroviasInstituto Keynes
 
جون شتاينبك - كأس من ذهب - رواية
جون شتاينبك - كأس من ذهب - روايةجون شتاينبك - كأس من ذهب - رواية
جون شتاينبك - كأس من ذهب - روايةAli Alaaraj
 
МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі...
 МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі... МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі...
МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі...Vera Taran
 
Socialmedia connecting the world with businesses
Socialmedia connecting the world with businessesSocialmedia connecting the world with businesses
Socialmedia connecting the world with businessesGeo Alega
 
Cuadrodedobleentrada nadia yale (1)
Cuadrodedobleentrada nadia yale (1)Cuadrodedobleentrada nadia yale (1)
Cuadrodedobleentrada nadia yale (1)Karen Rubio Sánchez
 
Fifa15
Fifa15Fifa15
Fifa15dimaes
 

Viewers also liked (17)

Pormotional
PormotionalPormotional
Pormotional
 
мы теперь не просто дети, мы теперь ученики!
мы теперь не просто дети, мы теперь   ученики!мы теперь не просто дети, мы теперь   ученики!
мы теперь не просто дети, мы теперь ученики!
 
Master your cloud with MYCLOUD CONTROL
Master your cloud with MYCLOUD CONTROLMaster your cloud with MYCLOUD CONTROL
Master your cloud with MYCLOUD CONTROL
 
Γιοκοχάμα
ΓιοκοχάμαΓιοκοχάμα
Γιοκοχάμα
 
Especialização em Engenharia de Ferrovias
Especialização em Engenharia de FerroviasEspecialização em Engenharia de Ferrovias
Especialização em Engenharia de Ferrovias
 
La amistad
La amistadLa amistad
La amistad
 
جون شتاينبك - كأس من ذهب - رواية
جون شتاينبك - كأس من ذهب - روايةجون شتاينبك - كأس من ذهب - رواية
جون شتاينبك - كأس من ذهب - رواية
 
Meditation tech. 3
Meditation tech. 3Meditation tech. 3
Meditation tech. 3
 
Los 5 sentidos JMMP
Los 5 sentidos JMMPLos 5 sentidos JMMP
Los 5 sentidos JMMP
 
La estructura de la cpu
La estructura de la cpuLa estructura de la cpu
La estructura de la cpu
 
МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі...
 МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі... МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі...
МК ВЧИТЕЛІВ УКРАЇНСЬКОЇ МОВІ ТА ЛІТЕРАТУРИ (інформація про педагогів гімназі...
 
Socialmedia connecting the world with businesses
Socialmedia connecting the world with businessesSocialmedia connecting the world with businesses
Socialmedia connecting the world with businesses
 
Cuadrodedobleentrada nadia yale (1)
Cuadrodedobleentrada nadia yale (1)Cuadrodedobleentrada nadia yale (1)
Cuadrodedobleentrada nadia yale (1)
 
Kare rubio
Kare rubioKare rubio
Kare rubio
 
Fifa15
Fifa15Fifa15
Fifa15
 
Presentation12 (2)
Presentation12 (2)Presentation12 (2)
Presentation12 (2)
 
Floor care
Floor careFloor care
Floor care
 

Similar to How Secure is Your Home Network Poster

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hackingCmano Kar
 
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentestingYunfei Yang
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technologySaumya Ranjan Behura
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 

Similar to How Secure is Your Home Network Poster (20)

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Advanced Wi-Fi pentesting
Advanced Wi-Fi pentestingAdvanced Wi-Fi pentesting
Advanced Wi-Fi pentesting
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Hacking and its Defence
Hacking and its DefenceHacking and its Defence
Hacking and its Defence
 
News Bytes - May 2015
News Bytes - May 2015News Bytes - May 2015
News Bytes - May 2015
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Internet security
Internet securityInternet security
Internet security
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 
It ppt new
It ppt newIt ppt new
It ppt new
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 

How Secure is Your Home Network Poster

  • 1. How Secure is Your Home Network INTRODUCTION More than 300 000 home and small office (SOHO) routers were found to have been compromised or hijacked by hackers. This security breach was discovered by some security researchers at team cymru, though not yet clear what the overall intention of the hackers is, it has been discovered that the nature of the hijack is similar to one that had occurred in Poland where internet bankers had been targeted by the hackers introducing malicious software in order to gain online banking login details. There are more risks and threats that a home network can be exposed to once it router has been compromised e.g. cyber bullying, DOS attacks, Man in the middle attacks, and Viruses. This project is going to investigate a home networks vulnerabilities, the types of threats that it can be exposed to once a hacker gets access to the network and things home network users can do to improve security of their network. METHODOLOGY  Assemble Penetration testing tools. For this case study Kali Linux which is suite of penetration testing tools will be used. Kali Linux will be installed to a SD card and will be run via the Raspberry Pi.  Attempt to crack the different wireless authentication password types i.e. WEP, WAP and WAP2 using war driving tools such Air-crack, Netstumbler, or Fern-WiFi-Cracker.  Record the results and difficulty level of cracking WEP, WAP and WAP2.  Enumerate Live hosts on the network using Nmap on Kali Linux.  Scan for Vulnerabilities on the devices / hosts including the router itself tools such as Nessus and Nikto will be used.  Attempt to carry out exploits on the devices based on the vulnerabilities found.  Record exploits and ease of access.  Compile a report and suggest security measures based on findings. EXPECTED RESULTS To expose vulnerabilities that exit within the home network including wireless authentication To exploit a known or discovered vulnerability to gain remote Access to a PC or Device, then obtaining the login password by carrying out a password attack. To exploit a known or discovered vulnerability to gain remote access to a PC with a web-cam and operate the web-cam remotely e.g. take a snapshot CONCLUSION Due to a rise in internet based (e-everything) e.g. e-business, e-banking, e-social, e-education and more there has also been a rise in cyber-crimes such as identity theft, cyber bullying, distributed denial of service (DDOS) attacks where a compromised system can be used as a botnet, etc. it is important that home network users play their part in ensuring network security by following the safe computer practices guidelines, as a compromised system can lead to other systems being compromised. NAME: Bobby Sibiya SID: 1023007 BSc (Hons) Information Security and Forensic Computing Email: bobby.sibiya@student.anglia.ac.uk