Project Plan – So where do we start?

WPTP  A.K.A Wifi Penetration Testing Project.

This is the idea that we chose. Now what this means actually was still in the fog for us. Our next checkpoint in our long journey was to figure out what exactly does that project idea mean. Will there be a physical, tangible object that we can use to break into the Wi-fi, or will it be more leaning towards a research kind of a type.

Ultimately we decided that our project will be a treatise about different ways to hack into the environment. We even had this click bait title in mind: “These four students broke through with these guides without any previous knowledge!”

Our course teacher also mentioned the site http://www.lulu.com, where you can self publish your own works. The idea itself was very good, since it could help people develop a more information security median mindset.

Our main goal will be to try different ways to break into WPA2 protected Wi-Fi networks. We will start with the easier protocols to hack into, and move forward with the difficulty as time goes by.

We will be splitting our group of four (4) into two (2) separate teams. Both of the teams will work their way into hacking through an entity in a safe lab environment, and write penetration testing reports and guides on this process. Then they will pass their guides to the other team, and they will try to recreate the same process with the guides given. That way we can be assured that our project fulfills to do what it’s meant to do.

Since our school does not have any courses that support our project (all of the courses are centered around information security, but there is none when it comes to ethical hacking) and none of us have any past experience doing something like this, we will have to rely on online courses to learn about this.

One of the sites that our teacher suggested to look into is Safari Books Online, which contains a lot when it comes to ethical white hat hacking.

This particular video course contains numerous examples on what to hack, and how to write penetration testing reports – so that you can learn to strengthen your domain/app/service security.

Safari Books and their “The Art of Hacking” is our start. This is where we will begin.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s