it is a group project, my group did send me their papers. In each tool they discussed I needed to come with an abstract, intro and conclusion. this is my part

Note : I will send the three tools papers (which are already made ) the writer need to do an abstract, introduction and conclusion .

in the conclusion need to make a compassion between the three tools as its mentioned below.

The project is intended to reinforce concepts and techniques introduced in this course. Specifically, each team will be tasked to performing a comparative analysis of three wireless networking attack tools to identify a preferred tool option for exploiting a wireless networks. The presentation portion of the project will provide a demonstration of the capabilities of the selected tool.

Access to the internet is just about a basic necessity in our current times. With the ever increasing use of smart devices, wireless connections provide critical access when cellular service is unavailable or a less preferred option. Wireless Local Area Networks (WLANs) are commonly used by businesses and organizations to supplement their LANs. Individuals also utilize wireless in their home networks to both access the internet and connect all devices. Since wireless connections are in such high use, this makes them ideal hunting grounds for hackers who possess effective attack tools (of which there are many).

WEP and WPA are the two main security protocols used in Wi-Fi LAN. WEP is known as Wired Equivalent Privacy (WEP). It is a deprecated security protocol which was introduced back in 1997 as a part of original 802.11 standards. But it was weak, and several serious weakness were found in the protocol. Now, this can be cracked within minutes. So, a new kind of security protocol was introduced in 2003. This new protocol was Wi-Fi Protected Access (WPA). It has evolved from WPA to WPA2 and is now the current security protocol used in wireless networks. To gain unauthorized access to a network, one needs to crack these security protocols.

As mentioned, there are many tools which can crack Wi-Fi encryption. The purpose of this group project is to identify and compare three such tools. These are powerful tools that utilize different techniques and approaches and perform varied functions to facilitate compromise of the network. This group project shall compare and contrast three selected wireless attack tools, with a demonstration provided for the one determined to be the most effective. Feel free to establish an operating environment (business, public space, or home) and the scenario most appropriate for conducting an apples-to-apples tool comparison.Identify any assumptions that are relevant for your analysis.

The project will consist of the following components:

  • Requirement (Paper)
    • Identify the three wireless attack tools selected by the team
    • Perform necessary topic research
    • Provide background information and an overview of each tool
    • Identify the conditions used as the basis for assessing which tool is the best (the project scenario)
    • Provide results of the comparative analysis
    • Include additional rationale providing justification for the selected tool
      • IMPORTANT:
        • Properly justify your recommendation above.
  • Utilize APA format for the paper (link to template below)


  • Including the following:
    • Font: New Times Roman, 12 pts, full-page illustrations are not counted as a page. I’ll check: subject matter, contents, linkage, exhibits, etc…
    • Title page: subject title, name of each team member, Instructor’s name, course number and title, University of San Diego.
    • Body pages: Minimum: 8 pages, Maximum: 10 pages
    • Reference page: Will confirm references, and will use a Plagiarism Checker:

    it is a group project, my group did send me their papers. In each tool they discussed I needed to come with an abstract, intro and conclusion. this is my part

on the conclusion page I will need to have a comparison to be made between the three tools that is used Aircrack, Wifite and wifi pineapple. as it is mention in the requirement page