jagomart
digital resources
picture1_Hacking With Python Pdf 192373 | Term 4 Presentation


 130x       Filetype PDF       File size 1.64 MB       Source: cs.uwc.ac.za


File: Hacking With Python Pdf 192373 | Term 4 Presentation
wi fi hacking with a raspberry pi name zukisa surname dyantyi student no 3567302 supervisor dr m norman co supervisor mr m muyowa csir background project is about cyber security ...

icon picture PDF Filetype PDF | Posted on 05 Feb 2023 | 2 years ago
Partial capture of text on file.
      WI-FI HACKING WITH A RASPBERRY PI
      NAME           : ZUKISA
      SURNAME        : DYANTYI
      STUDENT NO.    : 3567302
      SUPERVISOR     : DR. M NORMAN
      CO-SUPERVISOR : MR. M MUYOWA (CSIR)
    BACKGROUND
    ➢Project is about cyber security and creating 
     awareness of threats.
    ➢Build hacking prototype.
    ➢Retrieve hardware and software information and 
     penetrate Wi-Fi network.
    ➢Objective is educate campus community.
    ➢Give suggestions to the Wi-Fi network owners 
     found vulnerable.
    FUNCTIONAL REQUIREMENTS
    ➢Detect available Wi-Fi networks and hidden 
    networks.
    ➢Retrieve information about each network 
    detected.
    ➢Convert Mac address to vendor names.
    ➢Where possible penetrate Wi-Fi network with 
    weak encryption.
    ➢Document findings and educate the campus 
    community the importance of strong passwords.
    TESTING STRATEGIES
    ➢Unit testing and system testing
    ➢Unit testing:
     ➢Testing individual source codes.
     ➢Five Python scripts
    ➢System testing:
     ➢Hardware and Software integration
     ➢Kali Linux, Raspberry Pi and Python.
The words contained in this file might help you see if this file matches what you are looking for:

...Wi fi hacking with a raspberry pi name zukisa surname dyantyi student no supervisor dr m norman co mr muyowa csir background project is about cyber security and creating awareness of threats build prototype retrieve hardware software information penetrate network objective educate campus community give suggestions to the owners found vulnerable functional requirements detect available networks hidden each detected convert mac address vendor names where possible weak encryption document findings importance strong passwords testing strategies unit system individual source codes five python scripts integration kali linux...

no reviews yet
Please Login to review.