Thomas Myers

Degree: BSc Computing (Computer Networks and Cybersecurity)

Project title: Exploring the vulnerabilities of a typical home network

The project explores vulnerabilities within typical home networks. The overall aim of the project is to test the current state of standard internet security provided by internet service providers to homeowners by performing different type of attacks using penetration tools on a Kali Linux machine on a designed network that is based on a typical home network and to record the results to see if the attacks targeted at the home network were successful. 

The main findings were that if a cyber attacker has an end device within the same network as the homeowner on their own private home network then it is very easy for the cyber attacker to manipulate the network. Once the cyber attacker has gained access to the network, penetration tools available on the Kali Linux operating system give the cyber attacker many opportunities to perform a number of different attacks on the home network. One of these attacks was a ARP spoofer attack. This is a type of man in the middle attack that uses fake replies to trick the victim into being none the wiser that a network intrusion has occurred. The attacker was able to perform this attack using the Kali Linux terminal which is an open source terminal available to any internet user with a Kali Linux operating system. Another attack chosen to penetrate the network was a clone phishing attack that used faked login pages from social media giant Facebook and forwarded to link to the end devices on the network due to the ease of access to the end devices IP addresses.


Poster board

Click/tap on image to view as PDF

Share this page

Share on facebook
Share on twitter
Share on linkedin