博文

Week 5

图片
Week 5 This is the fifth week of our 5 weeks project. In this week, we: The function of recording the address, connection time, and connection duration of the connected user is implemented. Realized the function of counting the total number of people connected to WiFi per day. designed and made a project poster. Figure 1 shows the part of the code for recording the user's connection status and this code file named test.sh was placed in the router's folder named root which can be seen in Figure 2. When running this program, we can get a record of users connected status in real time. The results are shown in Figure 3. Figure 1: Part of code Figure 2: Display code file location  Figure 3: The results of recording users connected status in real time Download the log recorded by the router via the connection to the router's WiFi. Then run the program on our server to process the downloaded log to count the total number of people conn...

Week 4

图片
Week 4 This is the fourth week of our 5 weeks project. In this week, we: Successfully solved the problems that user's HTTP request could not be redirected to the server and web page could not pop out as expected. Modified the system diagram according to the newly used method Last week, we connected the entire system, but the user's HTTP request could not be redirected to our server web page. In this week, we tried a new method and solved this problem. We set up the OpenWrt DNSmasq service and edited the domin name resolution rules so that most domain name access requests can be redirected to our server web page. We also reset the IIS web server to pop out our designed web page. After testing, user's most of the HTTP requests were successfully redirected to the web page we designed. The following shows the test results of three different HTTP requests. 1.   http://google.com/ 2.  http://www.liverpool.ac.uk/ 3.  http://www.vita...

Week 3

图片
Week 3 This is the third week of our 5 weeks project. In this week, we: Made a more detailed system diagram Redesigned a project plan in Gantt chart form Connected the entire system (Router, Sever, web page) Tested Our more detailed system diagram is followed. The first step was to set our fake WiFi's name the same as the school official open WiFi's name which is used to induce users to connect our fake WiFi. Then a HTTP request would be send to our router. We downloaded a software in the router to redirect request to let our server send security warning web page to the user. Installed the OpenWRT to find the connection record. The redesigned project plan in Gantt chart form is shown below: In this week, we successfully connected the entire system which includes router, web page and server. Through the software we downloaded to the router, entered the server's IP address in the configuration file in this software to connect the router to the...

Week 2

图片
Week 2 This is the second week of our 5 weeks project. In this week, we: Made a specific project plan Created and recorded project logbook Redesigned a more detailed system diagram Set up the wireless access point of our fake WiFi Set up the basic settings of the OpenWrt router Set up the server on a personal computer Designed the server web page The specific project plan is shown below: Here is our redesigned more detailed system diagram: We set up the basic settings of the OpenWrt router by using putty to log in to OpenWrt via SSH connection. We named our fake open WiFi as the same name as school open WiFi network which is Eduroam. Also, we set up the wireless access point of our fake WiFi. The two pictures below shows these two settings. Then, we can find our fake WiFi named Eduroam on the mobile device with the same name as the school open WiFi network. As shown in the following diagram, we used the Internet information s...

Week 1

图片
Week 1   We started our 5 weeks year two project in this week. The topic of our open project is WiFi honeypot which is a technique to set an open fake WiFi to attract the potential victims to connect it. As the victims connect to the fake WiFi, they will be warned that this is a unsafe connection and the WiFi is fake. We aim to design a fake web pages which are frequently used by people and also carry out statistics of the “victims” who connect to the fake WiFi. The concept diagram below shows the theory of the WiFi honeypot project. In general, people will connect the real school WiFi and through the school serve to connect internet. However, in our project, we will create a fake WiFi to induce people connect and then our serve will give security warning. As shown in the below diagram, in daily life, the hackers will use this WiFi honeypot technique to steal personal privacy information. So our project is to remind people aware of this problem. In toda...