Preview

Netw360 Week 7 Lab

Satisfactory Essays
Open Document
Open Document
872 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Netw360 Week 7 Lab
Kyle Pederson
NETW360, Ben Brezinski
4/16/12
Lab #7

Hands on Lab

Microsoft Network Monitor Introduction and Wireless Frames

When we expanded frame 4 the signal strength was -60dbm, the data rate was 1mbps, and the SSID in the beacon frame was Amory. In frame 5, looking at the Hex Details, the BSSID for this access point was 00 15 E9 D1 48. The authentication status in frame 14 was successful. In frame 15, the Association Response status was in a successful state. When we tried to the Microsoft Network Monitor we were unable to pick up any management packets during our capture.

SNMP management

We were able to successfully ping 10.27.8.80 to verify we had access to the “managed” device. The batch file was set up with the 10.27.8.80 address and had commands to get information from that address. The name of the device was NPIF9460B and the status of it was “ready to print”. After we downloaded the MIB Browser and entered 10.27.8.80 into the address field, we were able to get the sysUpTime which was 830 hours 13 min and 2 sec.

Finding rogue access points

When using the command “netsh wlan show networks mode=bssid” in the command prompt we were able to identify 17 access points. Out of the 17 access points 11 were not part of the DeVry wireless network. Using the FindAccessPoints.BAT we were able to identify 18 access points and 12 of them were not part of the DeVry wireless network. Opening the FindAccessPoints.vbs in notepad we were able to see the script and the basis of the script worked around the command netsh wlan show networks mode=bssid. After we set up our Linksys as a rogue access point we had no problem finding it using the batch file. This would be very handy to use at your home network, if you lived in a place where there is many access points, because you could pick up any rogue access points that someone has set up to attempt to capture any of your information.

Logging

Here is our log file from our Linksys access

You May Also Find These Documents Helpful

  • Powerful Essays

    Netw410 Week 3 Lab

    • 629 Words
    • 3 Pages

    5. Does this network require a distribution layer? What devices would operate at the distribution layer? What would these devices be responsible for? Could the access and distribution layer be combined into a single layer? Draw a diagram of these devices at the distribution layer. Label all of the devices.…

    • 629 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Week 1 Labs 1

    • 3680 Words
    • 20 Pages

    Create a mapping similar to Figure 1- 2 for the binary number 11 2 using either paper and pencil or a Word document.…

    • 3680 Words
    • 20 Pages
    Satisfactory Essays
  • Good Essays

    Refer to the exhibit. When configuring the wireless access point, which setting does the network administrator use to configure the unique identifier that client devices use to distinguish this wireless network from others?…

    • 2145 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Documents NETW240 Wk4 Lab

    • 1983 Words
    • 10 Pages

    To start simply click on the named Server from the device list (located on the left hand side of the screen) and click the Power on from the in tools bar. In some cases the devices may power on automatically.…

    • 1983 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 2 Lab Report

    • 349 Words
    • 3 Pages

    The technical goals are to build a new IT section onto the admin building to make sure all the servers are centralized. Connect all buildings to the new IT section. Make sure to provide wireless access for all the students in classrooms. Provide high speed wired internet to all faculty offices. Make sure there is a centralized back up of all data. Replace the old phone system with VIOP.…

    • 349 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In this lab I was able to accomplish by using the show commands I learned how to investigate the network status. Not only will the benefit my professional career but it will also help me in the course on how to trouble shoot and learn the basics.…

    • 1117 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Netw410 Week2

    • 716 Words
    • 3 Pages

    Business Goals for this project include addressing the growth of on-campus and online students. To accomplish these goals a centralized server located in new IT wing of the administration building providing online backup of all data. Replacing the PBX-based telephone system with a VoIP based system and connecting all buildings providing high-speed wired network connection for all facility offices will be implemented along with controlled wireless access for students. Wireless access for students and general population will be provided outside the building.…

    • 716 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Packet list pane- shows packets and the information on each packet, that is separated info columns…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NETW410 Week 5 Lab Report

    • 297 Words
    • 2 Pages

    1. Provide an IP addressing plan for the existing campus and the new campus. (70 points)…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETW204week1labreport

    • 436 Words
    • 3 Pages

    Task 4, Step 2: Paste a screenshot AFTER you execute the “show ip route” command (2 points)…

    • 436 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Stands for Wired Equivalency Privacy. Uses 64 bit or 128 bit encryption. (including 24-bit IV)…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You are also able to perform detective work with the help of router and will identify the devices and if you want you are able to find the settings of ‘Hide a network’ and your neighbors are unable to scan your connection and every time you connect the device you should need to enter the SSID manually.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Netw250 Week 1 Ilabs

    • 290 Words
    • 2 Pages

    Answer: Chat session was not possible due availability of students, however I did send out request for chat sessions for three or four days.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Your monitor card must be in the same mode as the both the client and Access Point. So, for example, if your card was in “B” mode and the client/AP were using “G” mode, then you would not capture the handshake. This is especially important for new APs and clients which may be “turbo” mode and/or other new standards. Some drivers allow you to specify the mode. Also, iwconfig has an option “modulation” that can sometimes be used. Do “man iwconfig” to see the options for “modulation”. For information, 1, 2, 5.5 and 11Mbit are 'b', 6, 9, 12, 18, 24, 36, 48, 54Mbit are 'g'.…

    • 845 Words
    • 4 Pages
    Good Essays