WPA2 Cracking and MAC Address Spoofing
This project involved testing wireless network security by setting up a WPA2-secured test network and attempting to crack the encryption using Kali Linux and Reaver.
In a second phase, Bypass the MAC filtration by spoofing MAC with registered MAC address.
The proposed system named as Voice Controlled Electronics is basically a sub-domain of Smart Home also known as home automation.
In-Depth analysis and applications of FTK Imager
This project focuses on the FTK Imager, a widely used forensic imaging tool. The project includes a detailed examination of FTK Imager's features through practical demonstrations and
applies this knowledge to solve a forensic case study. The aim is to provide a comprehensive understanding of FTK Imager's capabilities and its application in digital forensics.
Understand the RSA algorithm and hash function along with digital signature. Develop an application and encrypt a message, sign it, and then send it over the network and to the receiver,
end decrypt the message and verify the integrity with the hash function and verify the user with a digital sign.
Port Security using Cisco Packet Tracer
This project demonstrates how to implement port security on a network switch using Cisco Packet Tracer. It includes configuring MAC address restrictions on switch ports to prevent unauthorized devices from accessing the network, thereby enhancing local network security.
Steganography, Cryptography and
Network Behaviour Analysis
This project explores how steganography can be used to hide data within image files and demonstrates both the embedding and extraction processes.
Additionally, it includes an analysis of network behaviour during data transmission, focusing on how TCP handles the transfer of steganographic files. Basic cryptographic techniques were also applied to enhance data confidentiality before hiding
IEEE 802.11 Wireless Framework Analysis
This project involves analysing the IEEE 802.11 protocol using network traffic capture tools. Key wireless management frames such as beacon frames, association requests, and disassociation notifications were examined to understand how wireless devices discover and maintain connections with access points.