802.11 Attacks

Project Objectives

In this individual project, you will study the 802.11 link-layer protocol and attacks that (mis)use the protocol.

Example Attacks

Requirements - Pick an Attack

Pick an existing 802.11 attack that is well known, described in the literature, has runnable proof of concept code, and involves the attacker transmitting (injecting) some frames. (A passive listening-only attack is not sufficient). Carefully study what the attack allows a malicious user to do, and how it works at the protocol level.

Deliverables:

  • Chapter 1: Introduction - This 1-2 page section provides a high-level overview of the attack.

Requirements - Run an Attack

Run your selected attack using existing code (developed by someone else).

Deliverables:

  • Wireshark .pcapng file capturing the attack in action. Filter out irrelevant packets from your original capture (e.g. hosts that were not attackers or victims)
  • Chapter 2: Attack Details - This 4-5 page section (w/Wireshark screenshots or other figures) describes how the attack works at the link layer
  • Chapter 3: Existing Attack - This 1-2 page section provides instructions on running the existing attack code and a description of what network configuration is necessary to demonstrate the attack.

Requirements - Implement an Attack

Implement the attack in your favorite programming language!

Deliverables:

  • Attack code
  • Chapter 4: Custom Attack - This 1 page section provides instructions on running your custom attack program.

Requirements - Implement an Attack Detector

Carefully consider what your attack looks like to a third party observer on the network. Implement a detector for the attack in your favorite programming language. You do not have to write a plugin for an Intrusion Detection System, but that is the idea of this section.

Deliverables:

  • Detector code
  • Chapter 4: Custom Attack Detector - This 1 page section provides instructions on running your custom attack detector program.

Requirements - Demonstration

In-class demonstration.

Grading

This is an individual project. The grading breakdown is:

  • Attack overview and selection - 10%
  • Attack execution with existing code - 10%
  • Custom attack implementation - 50%
  • Custom attack detector implementation - 30%

Grading of these items is partially accomplished through the in-class demonstration.

Submission

Submit all files to the Canvas CMS site.