Lab 9

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Lab 9

Name: Teh Teng Jun


Student Id : 0354326
Tutorial: Section 1
Tutor: Dr Mike Kok Sim Hong

Question 1-How many SSIDs did you discover? Did you have an idea of how many
SSIDs you were in range of?

Figure 1 SSID
While investigating the wireless networks in the surrounding area by Wi-Fi scanning
tool- Netspot, I uncovered a rich tapestry of 20 unique SSIDs. Each SSID representing an
individual wireless network and shedding light on the technological ecosystem in this locale.
The diversity in SSID names suggests a mix of personal, residential, and possibly business
networks. Some SSIDs may reflect the default names assigned by router manufacturers, while
others may offer glimpses into the creativity or personalization choices of network
administrators. Additionally, the sheer number of SSIDs highlights the ubiquity of wireless
connectivity, showcasing the prevalence of devices and the increasing reliance on wireless
communication in this specific environment. This observation not only underscores the
technological vibrancy of the area but also emphasizes the need for secure network practices
as more devices become interconnected in our daily lives.
Question 2-How many different vendors were detected?

Figure 2 Vendors
Besides that, a total of four vendors were identified in the analysis conducted. Each
vendor showcased unique characteristics and offerings within their products or services. The
diversity among these vendors contributed to a well-rounded understanding of the market
landscape. This comprehensive identification of four different vendors not only highlights the
breadth of options available but also underscores the importance of
considering various factors such as product features, pricing structures,
and customer reviews when making informed decisions in the relevant
domain. This multiplicity in vendor choices provides potential
consumers or stakeholders with a range of options to align with their specific
needs and preferences, fostering a competitive and dynamic
marketplace.

Question 3-What were the security settings detected for the wireless
networks?
Figure 3 Security
Moreover, the security settings detected for the wireless networks are WPA2 (Wi-Fi
Protected Access 2) and WPA3 (Wi-Fi Protected Access 3) protocols upon examination.
These security protocols are integral in safeguarding wireless networks from unauthorized
access and potential cyber threats. WPA2 has been a widely adopted standard for securing
Wi-Fi connections, offering robust encryption and authentication mechanisms. The
incorporation of WPA3 represents an advancement in wireless security, introducing stronger
encryption methods and enhanced protection against various cyber-attacks. Nevertheless,
the detection of both WPA2 and WPA3 underscores a commitment to maintaining a high
level of security for the wireless infrastructure, demonstrating a proactive approach to
mitigating potential vulnerabilities and ensuring the confidentiality and integrity of the
transmitted data. This dual-layered security approach reflects a comprehensive strategy in
addressing the evolving landscape of cybersecurity threats associated with wireless
communication.
Question 4-Was there any information you found extremely interesting?
On the other hand, the ability to compare different SSIDs and view aggregate
information on signal strength and channel usage particularly interesting for me. This is
because NetSpot's feature that allows users including us to compare different SSIDs (Service
Set Identifiers) and analyze aggregate information on signal strength and channel usage is a
valuable tool for optimizing Wi-Fi networks. This capability is crucial for identifying
potential sources of interference, as we can assess the quality of signals from various
networks in their vicinity. Besides that, the information provided by NetSpot includes signal
strength, channel usage within the 2.4 GHz and 5 GHz frequency bands, and dynamic
adjustments to real-time changes. By examining this data, users can make informed
decisions about channel selection, minimizing congestion and improving overall network
performance. This feature empowers users to strategically position access points, adjust
router settings, and optimize configurations, ultimately enhancing the efficiency and stability
of their Wi-Fi networks. It's a practical solution for users seeking to create a robust and
interference-free wireless environment.
Question 5-How many devices were detected?

Figure 4 Advance IP Scanner


The utilization of network scanning tools is essential for network administrators to
gain insights into connected devices, their manufacturers, and the services they offer. In this
section, the Advanced IP Scanner was employed to analyse devices within a local area
network (LAN). Below are some findings:

Number of Devices Detected:


A total of five devices detected on the network:
1. homerouter.cpe by HUAWEI TECHNOLOGIES CO.,LTD
2. Device with IP Address 192.168.8.100 (Manufacturer not specified)
3. Device with IP Address 192.168.8.101 (Manufacturer not specified)
4. DESKTOP-0TTTD3G by Intel Corporate
5. LAPTOP-ISQSCKES (inactive) by Intel Corporate
Question 6
What were some of the manufacturers listed?
Manufacturers Listed:
 The router at 192.168.8.1 is manufactured by HUAWEI TECHNOLOGIES
CO.,LTD.
 Two computers, identified by their MAC addresses (98:43:FA:6F:41:1D and
50:76:AF:D8:FE:23), are listed as Intel Corporate devices.
 However, the devices at 192.168.8.100 and 192.168.8.101 do not have a specific
manufacturer identified.
Question 7-What services were detected on certain devices?
Figure 5 Service Provided
 Device at 192.168.8.1 (homerouter.cpe):
 IP: 192.168.8.1
 Manufacturer: HUAWEI TECHNOLOGIES CO.,LTD
 MAC Address: 20:54:FA:7F:0A:91
 Services: HTTP and Web Server
This indicates that the device at 192.168.8.1 is running an HTTP and web server. In a home
network setup, routers often have web-based interfaces that can be accessed via a web
browser for configuration and management purposes. It's common for routers and similar
devices to use HTTP as the protocol for these interfaces.
 Web Interface: Routers often have a web-based interface that allows users to
configure and manage various settings, such as Wi-Fi passwords, network security,
and port forwarding. This interface is typically accessed by typing the router's IP
address (in this case, 192.168.8.1) into a web browser.
 HTTP Protocol: The fact that it mentions HTTP indicates that the web interface is
using the Hypertext Transfer Protocol, a common protocol for transmitting data on the
web. When you access the router's web interface, your browser communicates with
the router using HTTP.
Question 8- Is there anything extremely interesting that caught your eye?
The identification of a device labeled "LAPTOP-ISQSCKES" at the IP address
192.168.8.106, marked as "Dead," presents an intriguing aspect within the provided scan
results. In the realm of network scanning, the term "Dead" conveys that the scanning tool
encountered difficulties establishing a connection with this specific device during the
scanning procedure. The reasons for this status could encompass a spectrum of factors,
ranging from the device being intentionally powered off, encountering network connectivity
challenges, to possibly having security configurations in place that restrict its responsiveness
to the scan.This status prompts a consideration of diverse scenarios. It might be a routine
observation if the laptop is deliberately powered down, aligning with its expected behavior.
However, the "Dead" designation becomes particularly noteworthy if the absence of
connection was unanticipated or if the device is expected to be actively participating in the
network.

You might also like