I take this opportunity to present my votes of thanks to all those guidepost who really acted as lightening pillars to enlighten our way throughout this project that has led to successful and satisfactory completion of this study.We are really grateful to our HOD Mr. Rohit Dhand for providing us with an opportunity to undertake this project in this university and providing us with all the facilities. We are highly thankful to Miss Sukhdilpreet Kaur for her active support, valuable time and advice, whole-hearted guidance, sincere cooperation and pains-taking involvement during the study and in completing the assignment of preparing the said project within the time stipulated.Lastly, We are thankful to all those, particularly the various friends , who have been instrumental in creating proper, healthy and conductive environment and including new and fresh innovative ideas for us during the project, their help, it would have been extremely difficult for us to prepare the project in a time bound framework.
Organizations over the last few years have expended a considerable effort to protect their internal infrastructure from external compromise. As a result, the organizations have canalized their external network traffic through distinct openings protected by firewalls. The idea is simple. By limiting external connections to a few well protected openings, the organization can better protect itself. Unfortunately, the deployment of a wireless network opens a “back door” into the internal network that permits an attacker access beyond the physical security perimeter of the organization. As a result, the attacker can implement the “parking lot” attack, see figure 1, where the attacker sits in the organization’s parking lot and accesses hosts on the internal network. Ironically in some cases, the existence of the firewall may make the organization’s hosts more vulnerable to the attacker because of the mistaken premise that the hosts are immune from attack and potential compromise.
The injection attack involves "injecting" or forcefully inserting fragments or complete code. This is usually aimed at altering the normal path or execution of the flow of the operation. Injecting is usually done in places where user input is requested, and instead of entering standard inputs, the attacker inserts codes, thus leading to the name, injection attack.
In a traffic injection attack, a cracker can make use of access points that are exposed to non-filtered network traffic, specifically broadcasting network traffic such as “Spanning Tree” (802.1D), OSPF, RIP, and HSRP. The cracker injects bogus networking re-configuration commands that affect routers, switches, and intelligent hubs. A whole network can be brought down in this manner and require rebooting or even reprogramming of all intelligent networking devices.
First and the foremost I would like to thank to my almighty for giving me courage to bring up this term assignment.
At the outset, I would like to propose a word of thanks to my teacher, friends and other sources that gave an unending support and helped me in numerous ways from the first stage of my term assignment conceived.
I would also like to thank my family members for their whole hearted support and cooperation.
I duly acknowledge the contribution of ms. Darvindar kaur for invaluable help. Coding scientific calculator is an uphill task and would have not been possible without proper and timely assistance of ms. Darvindar Kaur.
I would also thanks to all my friends for forwarding their suggestions to make necessary modifications.
Special thanks to Ms. Darvindar Kaur for her able guidance in my term assignment