You are on page 1of 4

CHAPTER III: METHODOLOGY

CHAPTER III

METHODOLOGY

METHODS OF RESEARCH

This section presents the procedures and methodologies applied to the study,

including the details of the tools used for analysis and the method of research and

gathering data.

START

RECONNAISSANCE

SCANNING TARGET NETWORK

COE CE ME EE ARCHI

COLLECT TARGET NETWORK INFORMATION

PENETRATION TESTING

LISTENING TO THE TARGET


NETWORK
WIFI PASSWORD CRACKING ATTACK INFRASTRUCTURE ATTACK

INFRASTRUCTURE ATTACK

WPA WPA2 WEP VULNERABILITY SCANNING


CRACK CRACK CRACK

END

39
CHAPTER III: METHODOLOGY

Figure 3. Penetration Testing Process


Figure 3 shows the penetration testing process used in this research study. The

penetration testing process has two phases the reconnaissance and the penetration testing.

The first phase is the reconnaissance, where the researchers collect all the necessary

information that will be used for the penetration testing. The Figure 2 shows the Wireless

Local Area Network of the College of Engineering and Architecture Department. COE

for Computer Engineering Department, CE for Civil Engineering Department, ME for

Mechanical Engineering Department, EE for Electrical Engineering Department and

ARCHI for Architecture Department.

After gathering all the necessary information for the penetration testing, the

researchers will proceed to the penetration testing phase. This phase has two parts, the

wifi cracking password attack and the infrastructure attack. The Wireless Local Area

Networks will undergo the Wifi Cracking Password phase based on the WLANs security

protocol gathered in reconnaissance phase. Next is the infrastructure attack where the

researchers will have a vulnerability scanning. All these processes mentioned will be

recorded for the documentation of the Penetration Testing for Wireless Local Area

Network of Pangasinan State University Urdaneta City Campus.

40
CHAPTER III: METHODOLOGY

METHODS OF COLLECTING DATA

Observation

In this research, the researchers noticed that reports of various wireless devices

being targeted are widespread across the internet. As a result of this observation, the

researchers were aware of the potential threat of a malicious attack to both organizations

and individuals. With that, the researchers come up with the idea of a research study

about hacking in the perspective of a hacker, trying to penetrate a network and determine

the vulnerabilities of the network. The researchers will document how these attacks work

and the processes including the techniques and devices used for the attack.

Data Gathering

The first data to be gathered in this study is the WLAN security protocols. The

data gathered will be used for the penetration testing phase. Aside from the security

protocols, SSID or the network name is also needed. During the reconnaissance, the

researchers will use equipment for the data gathering, For the penetration testing phase,

the researchers will use another equipment.

Research

The internet will be used as the source of research regarding the data needed in

the study. Google is used as the search engine, and an existing project, Penetration

Testing for WLAN, and other sources like google scholar, YouTube and hak5 are used to

gather data used in the study.

41
CHAPTER III: METHODOLOGY

TOOLS FOR ANALYSIS

Testing

As mentioned, this study will use 2 phases for the penetration testing:

reconnaissance phase and the penetration testing phase. Each phase corresponds to

specific penetration testing tools, hardware and software. Equipment used should be

placed within the range area so the testing will be easier and quicker. Step-by-step

procedures of the penetration testing will be recorded including the specifications of the

equipment.

42

You might also like