Live Ddos View

Live DDoS Attack Map | Apakau

Live DDoS Attack Map

This map is the fruit of collaboration between Google Ideas and Arbor Networks in an effort to raise awareness about distributed denial of service attacks in the world everyday.

Exploring the Data

The Digital Attack Map displays global DDoS activity on any given day. Attacks are displayed as dotted lines, scaled to size, and placed according to the source and destination countries of the attack traffic when known. Some features include:

  • Use the histogram at the bottom of the map to explore historical data.
  • Select a country to view DDoS activity to or from that country.
  • Use the color option to view attacks by class, duration, or source/destination port.
  • Use the news section to find online reports of attack activity from a specified time.
  • View the gallery to explore some examples of days with notable DDoS attacks.

Sign Up

Monday, January 26, 2015

WAIDPS (Wireless Auditing and IDS/IPS)



WAIDPS (Wireless Auditing, Intrusion Detection and Prevention System) is an open source wireless swissknife written in Python and work on Linux environment. This is a multipurpose tools designed for audit (penetration testing) networks, detect wireless intrusion (WEP/WPA/WPS attacks) and also intrusion prevention (stopping station from associating to access point). Apart from these, it will harvest all WiFi information in the surrounding and store in databases. This will be useful when it comes to auditing a network if the access point is ‘MAC filtered’ or ‘hidden SSID’ and there isn’t any existing client at that moment.
WAIDPS may be useful to penetration testers, wireless trainers, law enforcement agencies and those who is interested to know more about wireless auditing and protection. The primarily purpose for this script is to detect intrusion. Once wireless detect is found, it display on screen and also log to file on the attack. Additional features are added to current script where previous WIDS does not have are :
·         automatically save the attack packets into a file
·         interactive mode where users are allow to perform many functions
·         allow user to analyse captured packets
·         load previously saved pcap file or any other pcap file to be examine
·         customizing filters
·         customize detection threshold (sensitivity of IDS in detection)
At present, WAIDPS is able to detect the following wireless attacks and will subsequently add other detection found in the previous WIDS.
·         Association / Authentication flooding
·         Detect mass deauthentication which may indicate a possible WPA attack for handshake
·         Detect possible WEP attack using the ARP request replay method
·         Detect possible WEP attack using chopchop method
·         Detect possible WPS pin bruteforce attack by Reaver, Bully, etc.
·         Detection of Evil-Twin
·         Detection of Rogue Access Point
The whole structure of the Wireless AuditingIntrusion Detection & Prevention System will comprise of
Harvesting WiFi Information         [Done]
Intrusion Detection                         [Done]
Intrusion Prevention                       [Done]
Auditing (Testing network)            [Done]
Other additional item include analyzing of packets, display of captured dump, display network barchart and much more.
Requirements
No special equipment is required to use this script as long as you have the following :
   1. Root access (admin)
   2. Wireless interface which is capable of monitoring and injection
   3. Python 2.7 installed
   4. Aircrack-NG suiteinstalled
   5. TShark installed
   6 TCPDump installed
   7 Mergecap installed (for joining pcap files)
   8 xterm  installed

Structure of WAIDS’ Display ::
Before starting with the detail description of the whole application, WAIDPS display structures are separated in several parts. For better understanding, the structures are as below.
WiFi-Harvesting Module
- Collecting/Storing of Access Points/Stations details and the relationship with each other. [Access Points / Wireless Clients Listing]
- Displaying of unassociated station information and its probe 
[Unassociated Stations]
- Allowing user to enter MAC addresses / Names to be monitored 
[Monitoring Panel]
- Association of stations to access point, station switch from one access point to another, station acting as both a wireless client and access point, etc 
[Association/Connection Alert]
Intrusion Detection
- Capture/Analyzing of packets
- Displaying of Station/Access Point MAC addresses and detected suspicious data count [Suspicious Activity Listing]
- Displaying of analysed WEP/WPA/WPS attack pattern and its detail [Attack Detected]

Tutorials ::

Screenshots ::  Click Here
Text & Image Tutorial :: Click Here
Installation Tutorial::

https://www.youtube.com/watch?x-yt-ts=1421914688&v=aGTQAWoeujA&x-yt-cl=84503534

More Video Tutorials:  Click Here

Download ::

Linux :: WAIDPS (.py)
- See more at: http://www.toolwar.com/2014/01/wireless-ids-tools.html#sthash.VPAHMQE7.dpuf

No comments:

Post a Comment