Completed
Thesis' Author:  Ricardo Daniel Carvalho Godinho
Course description: Integrated MSc in Network and Information Systems Engineering (MIERSI)
Supervisor(s):
Co-supervisor(s):
  • Pedro Brandão, IT/FCUP
Abstract:
<p style="text-align: left;"><span style="font-family: LMRoman12-Bold; font-size: 24pt; color: #000000;"><strong>Abstract</strong></span></p><p style="text-align: left;"><span style="font-family: LMRoman12-Bold; font-size: 24pt; color: #000000;"><br /><span style="font-family: LMRoman10-Regular; font-size: 10pt;">In recent decades we experience a continuous technological growth. With it the size of the<br /><span style="font-size: 10pt;">technology decreased and processing power increased significantly. With the use of increasingly<br /><span style="font-size: 10pt;">small devices came the need to take this portable power devices, and wireless technology emerged.<br /><span style="font-size: 10pt;">It is a technology that daily accompany people today, and a large part is dependent on it. However,<br /><span style="font-size: 10pt;">there are problems in terms of security that are unknown or at least not taken into account by<br /><span style="font-size: 10pt;">the majority of the population. These failures when properly exploited allow attackers to control<br /><span style="font-size: 10pt;">the devices to which they are associated, and in some cases others remaining in the same network.<br /><span style="font-size: 10pt;">With this black hats companies try to escalate the attacks on larger companies that possess higher<br /><span style="font-size: 10pt;">levels of security. The objective of this project involves creating a framework capable of analyzing<br /><span style="font-size: 10pt;">the access points in a given area verifying the existence or not of known vulnerabilities. For<br /><span style="font-size: 10pt;">the development of the framework we used the Python language and developed a template that<br /><span style="font-size: 10pt;">works as API for the implementation of the vulnerabilities that will arise. To allow improvements<br /><span style="font-size: 10pt;">we have taken into account the modulation of the framework. With this we intend that with<br /><span style="font-size: 10pt;">further development, vulnerabilities can be detected in good time, in order to be resolved or at<br /><span style="font-size: 10pt;">least avoided.</span></span></span></span></span></span></span></span></span></span></span></span></span></span></span><br style="line-height: normal; text-align: -webkit-auto; text-size-adjust: auto;" /></span></p>