week6_WIFI AND ENCRYPTION LAB
docx
keyboard_arrow_up
School
Mt San Jacinto Community College District *
*We aren’t endorsed by this school
Course
425
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
3
Uploaded by CoachHawk3729
WIRELESS
AND
ENCRYPTION LAB
WiFi:
Wardriving,
a
popular
technique
is
simply driving aroundwith
inexpensive
equipment
that
randomly
searches
for
access points that
have
not
been
secured.
Hackers
use
varioustools
to
discover
unsecure
access points and
in
this
lab,
Wifite will
be
explored
in
its
utility
to
discover
unsecure
access points.
Wifite
Discovering
Aps
with
Wifite:
Learn how to use Wifite to scan
for
APs.
1.
Log
into
the
vCLoudand
follow the
instructions
on
page
318
and
319
of
your
course book—
Discovering
APs
with
Wifite
(Activity
11-3)
2.
What
information
did
you
find?
What
does
this
information
provide
you
as
an
ethical hacker?
(think providing
security
solutions).
Recordyour
answers.
While working on this lab, I opened my Kali Linux VM, opened my terminal and typed in
Wifite. After typing Wifite, it took around 10-15 seconds for the scanning to complete. I then
saw SSID's of local networks near me and even the guest Wi-Fi of a Two Stones Pub
restaurant. I saw the ENCR numbers, most of them were WPA2 except one which was still
using WEP. I then saw a listing showing "Power" and “Client". As an ethical hacker, I feel this
tool is very useful for a couple reasons. One of them is because if I am a pen tester for the
company and I notice the network is using unsecure access points, I can go ahead and point
this out to them so they can improve their network security. Another reason why this is
useful is this will give you good insight on whether you need to change your SSID name as
well. There isconcern though that if a malicious hacker were to use this for malicious
purposes, they could launchattacks ranging from DNS spoofing to DDoS attacks etc.
Encryption—Understanding Public Key
Infrastructure:
Public Key
Infrastructure (PKI)
is
a
combination
of
hardware,
software,
people,
policies
and
procedures
required
to
create,
manage,
distribute,
use,
store
and
revoke digital signatures.
Components
of
PKI:
Certificate
management system
—generates,
distributes,
stores and
verifiescertificates.
Digital certificates
—establishes
credentials
of
a
person when
doing
online transactions.
Validation
authority
—stores
certificates
(with
their
public keys).
Certificate
authority
—issues
and
verifiesdigital certificates.
End
user
—requests,
manages
and
uses
certificates.
Registration
authority
—acts
as
the
verifierfor
the
certificate
authority.
Creating
a
rogue server certificate
by
breaking
a
hashing
algorithm:
Investigate
what
attackers
can
do
with
results of
an
MD5
collision.
1. Log
into
the
vCLoudand
follow the
instructions
on
page
347
and
348
of
your
course book—
Creating
a
rogue server
certificate
by
breaking
a
hashing
algorithm
(Activity
12-3)
Recordyour
answers.
The researchers collected 30,000 Web site certificates in 2008. How many were signed
with MD5?9,000
What kind of hardware was used to generate the chosen-prefix collision?
PlayStation 3's
How much money did the researchers spend on certificates?
$657.00
What was the impact of generating a rogue CA certificate?
The impact was being able to fully sign trusted certificates and a malicious attacker can
pick a more realistic CA name and fool experts.
What would this certificate allow someone with malicious intentions to do?
DNS spoofing, ARP spoofing and proxy auto discovery.
Which hashing algorithm were CAs forced to use after their signing method was
demonstrated as not secure?
SHA1
According to the researchers, what's the only way you can effect change and secure the
Internet?"
Making the theoretical possible is sometimes the only way you can effect change and
secure theInternet.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help