Professional Documents
Culture Documents
Chapter 3
Chapter 3
CHAPTER III
METHODOLOGY
METHODS OF RESEARCH
This section presents the procedures and methodologies applied to the study,
including the details of the tools used for analysis and the method of research and
gathering data.
START
RECONNAISSANCE
COE CE ME EE ARCHI
PENETRATION TESTING
INFRASTRUCTURE ATTACK
END
39
CHAPTER III: METHODOLOGY
penetration testing process has two phases the reconnaissance and the penetration testing.
The first phase is the reconnaissance, where the researchers collect all the necessary
information that will be used for the penetration testing. The Figure 2 shows the Wireless
Local Area Network of the College of Engineering and Architecture Department. COE
After gathering all the necessary information for the penetration testing, the
researchers will proceed to the penetration testing phase. This phase has two parts, the
wifi cracking password attack and the infrastructure attack. The Wireless Local Area
Networks will undergo the Wifi Cracking Password phase based on the WLANs security
protocol gathered in reconnaissance phase. Next is the infrastructure attack where the
researchers will have a vulnerability scanning. All these processes mentioned will be
recorded for the documentation of the Penetration Testing for Wireless Local Area
40
CHAPTER III: METHODOLOGY
Observation
In this research, the researchers noticed that reports of various wireless devices
being targeted are widespread across the internet. As a result of this observation, the
researchers were aware of the potential threat of a malicious attack to both organizations
and individuals. With that, the researchers come up with the idea of a research study
about hacking in the perspective of a hacker, trying to penetrate a network and determine
the vulnerabilities of the network. The researchers will document how these attacks work
and the processes including the techniques and devices used for the attack.
Data Gathering
The first data to be gathered in this study is the WLAN security protocols. The
data gathered will be used for the penetration testing phase. Aside from the security
protocols, SSID or the network name is also needed. During the reconnaissance, the
researchers will use equipment for the data gathering, For the penetration testing phase,
Research
The internet will be used as the source of research regarding the data needed in
the study. Google is used as the search engine, and an existing project, Penetration
Testing for WLAN, and other sources like google scholar, YouTube and hak5 are used to
41
CHAPTER III: METHODOLOGY
Testing
As mentioned, this study will use 2 phases for the penetration testing:
reconnaissance phase and the penetration testing phase. Each phase corresponds to
specific penetration testing tools, hardware and software. Equipment used should be
placed within the range area so the testing will be easier and quicker. Step-by-step
procedures of the penetration testing will be recorded including the specifications of the
equipment.
42