Week 6 Reading Summary, Question, and recent Cyber Security News…
- Summarize one key point from each assigned reading…
Packet sniffing in a switched network environment will usually be implemented by a man-in-the-middle attack (active user data eavesdropping captured by the attacking PC using software such as “Cain.”) Best ways to protect against packet sniffing are the following: high encryption between PCs (SSH client software, IPsec setup within OSes, and logically segmented networks via virtual LAN implementations.
- Question to classmates (facilitates discussion) from assigned reading…
How to best secure Wi-Fi access against packet sniffing by hacker (example: hacker may use Wireshark software [freeware LAN analyzer used to passively capture 802.11 packets transmitted over Wi-Fi])?
*NOTE: Answer is the following: use latest WPA2-AES (at least 256 bit encryption) with excellent passphrase (character length at least 15-characters using combo of lower-case & upper-case letters including other keyboard symbols) to better secure 802.11 based wireless network access.
- Identify, read, and post to our blog a current event article regarding ethical hacking & penetration testing (follow theme topic of the week, or other interesting related article)…
In the Cyber Security News lately (reported by eHackingNews.com on 3/30/2015)…
Security flaw in hotel Wi-Fi could allow hackers to infect guests systems with malware…
www.ehackingnews.com/2015/03/security-flaw-in-hotel-wi-fi-could.html?m=1
… ANTlabs InnGate Wi-Fi devices used by hotels vulnerability (remote access obtained via unauthorized RSYNC daemon running on TCP-873 port, and then attacker has R+W access within Linux OS [can create root level user, install malware for Wi-Fi hotel victims download, etc.]) How to mitigate this system vulnerability? Block unauthorized RSYNC (TCP-Deny port 873.)
Leave a Reply