diff --git a/2ano/1semestre/rc1/pratica05/Guide5_Wireless_AA_v20211214.pdf b/2ano/1semestre/rc1/pratica05/Guide5_Wireless_AA_v20211214.pdf new file mode 100644 index 0000000..31c658c Binary files /dev/null and b/2ano/1semestre/rc1/pratica05/Guide5_Wireless_AA_v20211214.pdf differ diff --git a/2ano/1semestre/rc1/pratica05/pratica05.html b/2ano/1semestre/rc1/pratica05/pratica05.html new file mode 100644 index 0000000..39c8e9e --- /dev/null +++ b/2ano/1semestre/rc1/pratica05/pratica05.html @@ -0,0 +1,72 @@ + + + + + + + - + + + + + + +

GUIÃO 5

+

Ex 2

+

By analyzing the captured packets, there is a big amount of them, so we'll have to use filters for the packets.

+

Assossiation

+

The filters used to see the association packets are:

+ +

After each connection, there is an exchange of Authentication packets between PC2 and the Router.

+

Authentication

+

The filters used to see the association packets are:

+ +

Since we're connecting to a network with no password, the Authentication process uses an Open System algorithm.

+

On the other hand, on the Deauthentication process, it disconnects with a reason behind it.

+

Probe

+

These packets are constantly transmitted so that the router may know how many clients are currently connected, and where they are connected.

+
+

Ex 3

+

As mentioned before, association packets are exchanged on a new connection, and responsible for informing the router about the information of the connecting device.

+

After pinging the Router and applying the filter icmp, on PC1 while keeping the MAC address filter, we can see that they exchange ARP packets. During pinging process, after each request, we get Request to Send (RTS) and Clear to Send (CTS) packets.

+
+

Ex 4

+

Since now we are sending larger packets, the connection elapsed time will be higher and it's also more unstable.

+

Since the limit of the RTS and CTS packets is 1000 bytes and we are trying to send packets larger than that, it ends up resulting on that unstability.

+

Those packets are used to limit the bandwidth used by each user, otherwise it could overwhelm the router and cause connection issues for other users.

+
+

Ex 5

+

During the authentication process, since now we are using a private network, instead of having just the association packets, we will also have authentication packets with keys to validate the connection.

+

We also won't be able to capture ICMP packets from this connection.

+ + diff --git a/2ano/1semestre/rc1/pratica05/pratica05.md b/2ano/1semestre/rc1/pratica05/pratica05.md new file mode 100644 index 0000000..6e7422e --- /dev/null +++ b/2ano/1semestre/rc1/pratica05/pratica05.md @@ -0,0 +1,56 @@ +# GUIÃO 5 + +## Ex 2 + +By analyzing the captured packets, there is a big amount of them, so we'll have to use filters for the packets. + + +### Assossiation + +The filters used to see the association packets are: + +* `wlan.fc.type_subtype==0 || wlan.fc.type_subtype==1` → used to watch assosciation request and responses, respectively. +* `wlan.addr == mac_pc` → used to filter the MAC address of PC2, coupled with an AND (&&). + +After each connection, there is an exchange of Authentication packets between PC2 and the Router. + +### Authentication + +The filters used to see the association packets are: + +* `wlan.fc.type_subtype==11 || wlan.fc.type_subtype==12` → used to watch authentication and deauthentication, respectively. +* `wlan.addr == mac_pc` → used to filter the MAC address of PC2, coupled with an AND (&&). + +Since we're connecting to a network with no password, the Authentication process uses an Open System algorithm. + +On the other hand, on the Deauthentication process, it disconnects with a reason behind it. + +### Probe + +These packets are constantly transmitted so that the router may know how many clients are currently connected, and where they are connected. + +--- + +## Ex 3 + +As mentioned before, association packets are exchanged on a new connection, and responsible for informing the router about the information of the connecting device. + +After pinging the Router and applying the filter `icmp`, on PC1 while keeping the MAC address filter, we can see that they exchange ARP packets. During pinging process, after each request, we get Request to Send (RTS) and Clear to Send (CTS) packets. + +--- + +## Ex 4 + +Since now we are sending larger packets, the connection elapsed time will be higher and it's also more unstable. + +Since the limit of the RTS and CTS packets is 1000 bytes and we are trying to send packets larger than that, it ends up resulting on that unstability. + +Those packets are used to limit the bandwidth used by each user, otherwise it could overwhelm the router and cause connection issues for other users. + +--- + +## Ex 5 + +During the authentication process, since now we are using a private network, instead of having just the association packets, we will also have authentication packets with keys to validate the connection. + +We also won't be able to capture ICMP packets from this connection. \ No newline at end of file diff --git a/2ano/1semestre/rc1/pratica05/pratica05.pdf b/2ano/1semestre/rc1/pratica05/pratica05.pdf new file mode 100644 index 0000000..4d3d156 Binary files /dev/null and b/2ano/1semestre/rc1/pratica05/pratica05.pdf differ