IT395_ERIC_CLARKSON_UNIT_7_ASSIGNMENT_1
docx
keyboard_arrow_up
School
Purdue Global University *
*We aren’t endorsed by this school
Course
395
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
11
Uploaded by BarristerRiverRook47
1
Unit 7 Assignment 1
IT395 Certified Ethical Hacking II
Eric Clarkson
Purdue Global University
Professor Donald McCracken
October 10, 2023
2
1.
What tools do black hat hackers use to attack wireless traffic? 200 words minimum.
Wireless traffic is vulnerable to a variety of attacks by black-hat hackers who use a variety of tools to carry out their malicious actions. Packet sniffers, rogue access points, and denial of service (DoS) attacks are among the most widely utilized technologies.
Packet sniffers are software applications that enable hackers to collect and examine data packets sent over a wireless network. A hacker can use this program to acquire sensitive data such as usernames and passwords, as well as monitor network traffic to find potential weaknesses.
Rogue access points, often known as evil twins, create phony access points that impersonate real wireless networks. Users who connect to these bogus networks risk having their
data collected and stolen by hackers. This form of attack is especially effective in public settings like airports and coffee shops, where users are more likely to connect to unknown networks.
DoS attacks are another popular method used by black-hat hackers to disrupt wireless traffic. These assaults overwhelm the network, making it unreachable to genuine users. This type
of attack can be devastating to firms that rely on wireless networks to run their operations.
3
In addition to the technologies listed above, black-hat hackers may employ social engineering techniques to obtain access to wireless networks. For example, they may send phishing emails or set up fraudulent websites to deceive consumers into disclosing their login credentials.
To summarize, black-hat hackers' techniques for attacking wireless traffic are numerous and always changing. As a result, organizations and people must be attentive and take proper precautions to protect their networks from such harmful actions.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
2.
What are some possible attacks against WPA encrypted traffic? 200 words minimum.
WPA (Wi-Fi Protected Access) encryption is an effective method for safeguarding wireless networks, although it is vulnerable to a variety of attacks. Despite its efficiency in protecting networks, it might be vulnerable to flaws that attackers can exploit. The brute-force attack is one of the most common attacks against WPA encrypted traffic. An attacker utilizes software and powerful computers to try multiple password combinations until the correct one is determined in this type of attack. A dictionary attack, which uses a pre-compiled list of commonly used passwords to try and guess the network's password, is another option. This attack is more successful when the administrator has picked a weak, readily guessable password.
The man-in-the-middle attack is another type of attack that can be employed against WPA-encrypted traffic. In this form of attack, the attacker intercepts communication between two network devices and then modifies the data being transmitted. The attacker can then steal sensitive information such as passwords and credit card numbers.
5
Another possible attack against WPA encrypted traffic is a rogue access point attack. The attacker in this sort of attack establishes a bogus wireless access point that mimics the actual network. When users connect to the bogus access point, the attacker has the ability to intercept their traffic and steal important information. Finally, attackers can take advantage of flaws in the WPA encryption protocol. If a vulnerability is uncovered, attackers can exploit it to overcome encryption and get network access. To summarize, while WPA encryption is an efficient method of securing wireless networks, it is not immune to many sorts of assaults. Network administrators must be aware of these vulnerabilities and take appropriate precautions to secure their networks.
6
3.
What is the “evil twin” attack? 200 words minimum.
The "evil twin" attack is a type of rogue access point attack designed to steal sensitive information from unwary users. This type of attack is building a bogus wireless access point that mimics the legitimate network, frequently with a name that is similar or identical to the real network. When users connect to the bogus access point, the attacker has the ability to intercept their traffic and steal important information.
Because users may not realize they are connecting to a false access point, the "evil
twin" attack is especially successful against networks that use WPA encryption. This form of attack is common in public places like coffee shops, airports, and hotels, where people are likely to connect to Wi-Fi networks.
An attacker must first build a bogus wireless access point before launching an "evil twin" attack. This can be done with a laptop or other device that can create a Wi-Fi hotspot. The attacker then assigns the fake access point a name that is close or identical to
that of the authentic network and configures it to employ WPA encryption.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
After establishing the false access point, the attacker must wait for users to connect to it. This can be accomplished by scanning the airwaves for nearby Wi-Fi devices or by employing social engineering techniques to convince people to connect to the bogus access point.
Once users connect to the bogus access point, the attacker can intercept their communications and steal sensitive information such as passwords, credit card numbers, and other personal information.
To protect against "evil twin" attacks, network administrators must use strong passwords and encryption, as well as monitor their networks for unusual activities. Users should also be cautious while connecting to public Wi-Fi networks, and they should double-check that they are connecting to a legitimate network before inputting any important information. Users can help protect themselves from "evil twin" assaults and other sorts of cyber threats by taking these actions.
8
4.
How can you authenticate, authorize, and audit wireless traffic on a Windows Active Directory Network? Please detail the actual setup.
A few key actions must be taken to ensure the authentication, authorization, and auditing of wireless traffic on a Windows Active Directory network. The first step is to ensure that the network is set up to use WPA2 encryption and a strong, one-time password. Furthermore, the network must be configured to use 802.1x authentication, which requires users to submit a valid login and password before connecting to the network. This safeguard keeps unauthorized users out of the network and ensures that only authorized users have access.
A RADIUS server must be deployed on a Windows Active Directory network in order to implement 802.1x authentication. The RADIUS server acts as the network's central authentication point for all wireless clients. Opening the Server Manager, adding Roles and Features, installing the Network Policy and Access Services role, and opening the NPS (Network Policy Server) console from the Administrative Tools menu are all required steps in installing a RADIUS server on a Windows Server machine. After that, select RADIUS Clients and Servers, then RADIUS Clients, and finally the Add button. The wireless access point or controller's IP address should be entered, and a shared secret should be used to authenticate the RADIUS server and the wireless access point or controller.
9
Then go to Policies and select Network Policies. To create a new policy, click the Add button, give the policy a name, and then select the conditions and parameters to apply. For example, before joining the network, users must submit authentic usernames and passwords. After you've configured the policy, try connecting to the wireless network
with a client device. A prompt will appear, asking for a login and password.
Wireless traffic can be audited if the network has been set up to employ 802.1x authentication and a RADIUS server. This is accomplished by enabling logging on the wireless access points or controllers and reviewing the logs for any suspicious behavior. A network monitoring tool can also be used to discover and respond to security threats in real-time.
To summarize, in order to authenticate, approve, and audit wireless traffic on a Windows Active Directory network, the network must be configured to use WPA2 encryption and 802.1x authentication, a RADIUS server must be installed, and logging on wireless access points or controllers must be enabled. Following these steps ensures that only authorized users have access to the network and that any suspicious activity is quickly discovered and addressed.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
10
References
Cyber security WiFi attacks
. (n.d.). W3Schools Online Web Tutorials.
https://www.w3schools.com/cybersecurity/cybersecurity_wifi_attacks.p
hp
JasonGerend. (2023, April 28).
Deploy password-based 802.1X authenticated wireless access
. Microsoft Learn: Build skills that open doors in your career.
https://learn.microsoft.com/en-us/windows-server/networking/core-
network-guide/cncg/wireless/a-deploy-8021x-wireless-access
JasonGerend. (n.d.).
Wireless access deployment
. Microsoft Learn: Build skills that open doors in your career.
https://learn.microsoft.com/en-us/windows-server/networking/core-
network-guide/cncg/wireless/e-wireless-access-deployment
Kinzer, K. (2022, May 10).
A complete guide to active directory authentication
. JumpCloud.
https://jumpcloud.com/blog/active-directory-authentication
Poston, H. (2021, May 6).
13 popular wireless hacking tools [updated 2021]
. Infosec Resources - IT Security Training & Resources by Infosec.
https://resources.infosecinstitute.com/topics/hacking/13-popular-
wireless-hacking-tools/
Scarfone, K., & Shea, S. (2022, December 13).
12 types of wireless network attacks and how to prevent them
.
11
TechTarget.
https://www.techtarget.com/searchsecurity/feature/A-list-of-wireless-
network-attacks
Security, P. (2021, December 13).
What is an evil twin attack?
Panda Security Mediacenter.
https://www.pandasecurity.com/en/mediacenter/security/what-is-an-
evil-twin-attack/
Top ten tools for cybersecurity pros (and Black hat hackers)
. (2020, February 26). Online
Masters Degree in Cybersecurity | Guide to Cybersecurity Graduate Programs.
https://www.cybersecurityeducationguides.org/2017/11/top-ten-tools-
for-cybersecurity-pros-and-black-hat-hackers/
webtitanadmin. (201, June 19).
Most common wireless network attacks
. WebTitan DNS Filter.
https://www.webtitan.com/blog/most-common-wireless-network-attacks/
What is active directory authentication and how does it work?
(2022, December 29). Sectona.
https://sectona.com/pam-101/authentication/active-directory-based-
authentication/