Portable Cyber Security Box - Protection from all Cybersecurity threats

The Security Box

Security Box allows you freedom to work at home, at co-working place, during travel. Just connect with USB power of your laptop and work with peace of mind. Having dual connectivity for internet - USB and Ethernet, while wirelessly connect with built-in secure Access point to connect multiple computers and sharing secure internet with data security & protection of critical data for businesses. Being online and yet staying away from cyber attacks is the FORTE of Security Box.


Wireless hacking - Access Point and packet basics

  1. An access point provides a medium for the wifi clients to connect to the network. It generally has a wired side and a wireless side. The client connects to the access point through the wireless side and the access point forwards the information through its wired side.

    An access point is configured with a name so that it could be identified on the network. That is what is called a SSID or the service set identifier. The SSID is a name given to an access point or to a network consisting of multiple access points. WiFi clients search for the access point or the network using this SSID. When you start the wifi utility on your laptop or any other device you will see a list of available access points or networks. Now, an interesting point to notice here is how our laptop does or mobile phones come to know about these networks?

    What happens here is that the access point keeps broadcasting packets in its RF vicinity to announce its presence, these broadcast packets are known as Beacon frames. These beacon frame makes the access point visible to the wifi client.

    Basics of packets :-

    Packets could be divided broadly into three types :

    1)Management packets
    2)Data packets
    3)Control packets

    These packets are further subdivided into multiple subtypes, we will look at the details of only those packets that we will be requiring more often for security perspective. However the reader is encouraged to go through the details of each of these packets and their subtypes given in the 802.11 standard specifications by IEEE.

    In order to gain more practical knowledge we would first see a basic sniffing attack and then will analyze the underlying concepts. To make the text more relevant we will learn new concepts that were not mentioned above.