Preaload Image

4th Period

12-3 Class Instructions

Essential Question: How is wireless communication secured? How is the data that is sent protected?.

Objective: Study the wireless authentication protocalls, handshakes and encryptions..

Thank you guys for behaving last class. Except for Ethan, who logged onto someones discord and posted inappropriate messages smh. Last class we learned about wireless attacks and the devices that are used in those attacks. Today we’re covering the protection of wireless networks. There are still vulnerabilities, but this is how the information is protected.

I like this video, the guy is funny and smart!

 

 

 

That’s it for today, we’ll pick up with more next class period!

**Remember ALL classroom rules apply. Please be on your best behavior because it is a reflection of our program.

 

Essential Question: How do cyber criminals execute wireless attacks and how to mitigate those attacks.

Objective: Research popular programs and tools used in wireless attacks such as Wireshark and Wifi pineapples.

Yooooo!!! When we were last is testout we left off on section 5.11 Configuring Wireless Networks and Wireless attacks.

Were going to explore some of the tools used in wireless attacks. Usually the purpose of wireless attacks are to capture Data traveling over a network. Surprisingly, wifi isn’t very secure… for instance… You’re traffic can be encrypted (jumbled up by an algorithm, then unjumbled when it gets to where it’s supposed to)… but while it travels through the air.. really anybody can capture it. Then if they have the tools, they can “unencrypt” it.
To capture data traveling on a network, some people use:

Wireshark: a program that listens in on networks and can capture data

Wireshark only really captures the data and tells you what type of data it is (http, email traffic, ftp, etc.). You usually use a programming language like Python in order to break the encryption. Here is a video about Wireshark and how to use it.

There are also other vulnerabilities with wireless networks. For instance, did you know that wireless devices like laptops are constantly looking for wifi connections? This makes it easy for devices to take advantage of them. Like a :

Wifi Pineapple – A wireless hotspot that acts as a safe trusted wifi device, and tricks computers into logging onto it rather that a real wifi access point.

When the computer logs on to the pineapple, it sees it as regular internet. All websites work but might load slightly slower, while the pineapple captures all the data sent back and forth and usually sends that data to another hidden laptop.

 

You might see the word “Honeypot” thrown around.

Honeypot: Honeypots are a trick to get users to connect to it, but usually has ulterior motives. It doesnt have to be a network device though… If the FBI set up a fake movie download site to catch people who pirate movies that would be considered a honeypot also.

That’s it for today, we’ll pick up with more next class period!

**Remember ALL classroom rules apply. Please be on your best behavior because it is a reflection of our program.