Sei sulla pagina 1di 3

Bartolay, Zarina Luz R.

Decena, Mary Ann P.


Fernandez, Kyla Kathrine C.
Ibay, Beverly Ruth C.
Palao, Vingalliah F.
Zaballero, Winnsie S.
GROUP 6
WIFI EAVESDROPPING

Crucial Talking Points


1. What is it and its negative impact to the users?
2. What is at risk?
3. How does it take place/how do we acquire it (if possible)?
4. How do we detect it? How to avoid it?
5. Safety Tips and Precautions to avoid it from happening to you

I. What is it and its negative impact to the users?


Wi-Fi Eavesdropping can involve a hacker stealing data while on a public, unsecured wifi
network. The unsecured transmission of data allows for the theft of anything that’s unencrypted,
from passwords to files to financial information (both personal and business-related).
• also known as a sniffing or snooping attack
• unauthorized real-time interception of a private communication
• doesn't cause network transmissions to appear to be operating abnormally

Negative impact to the users


 Transmission of data allows for the theft of anything that’s UNENCRYPTED.
 WEAKENED CONNECTION between client and server
 RECORD THE CALLS without being observed by the callers.
 Using your network for ILLEGAL PURPOSES

II. What is at risk?

1. Man-in-the-middle attacks. Man-in-the-middle is a type of eavesdropping attack that occurs


when a malicious actor inserts himself as a relay/proxy into a communication session between
people or systems.
Connecting to free, public Wi-Fi brings business risks from having your company data
intercepted by third parties. This is because hackers have the ability to position themselves
between your employees who are using the Wi-Fi and the connection point.
2. Distribution of malware over unsecured Wi-Fi. Malware software is malicious software,
created to deliberately damage, disable or control computers, devices and servers.
Hackers can also use an unsecured Wi-Fi connection to distribute malware. Having
infected software on your computers and devices can be financially crippling to your business.
3. Malicious attacks through ad hocs. Ad hocs are peer-to-peer networks which connect two
computers directly. When remote workers use a public Wi-Fi network, their devices are likely
to be set to discover new networks, making it possible for hackers to connect directly to them.
4. Rogue Wi-Fi networks. Rogue Wi-Fi network set up by an attacker which network enticingly
called "Free Wi-Fi" may be set up precisely to harvest your business's valuable data.
You and your team could be tricked into using a rogue Wi-Fi network set up by an attacker.
That network enticingly called "Free Wi-Fi" may be set up precisely to harvest your business's
valuable data.

III. How does it take place/how do we acquire it (if possible)?


According to the Security Wiki, “to perform Wi-Fi eavesdropping, a hacker sets up a Wi-Fi
hotspot near a location where people usually connect to a public Wi-Fi network. This can be a
hotel, a restaurant or you’re local Starbucks. The hacker then names the hotspot after the actual
public network that people use in that location (thus the name “evil twin”).
Since people usually set their devices to remember and automatically reconnect to known
Wi-Fi networks, as soon as they come in the vicinity of the malicious hotspot, they automatically
connect to it. The user will then think they have been connected to the legitimate network.
Since they are acting as the gatekeeper to the internet, the attackers can now perform a
number of man-in-the-middle techniques. For instance, they can perform SSL stripping attacks to
force users to go through the unencrypted versions of their favorite websites, or they can stage
DNS hijacking to redirect users to bogus versions of the websites they’re trying to connect to.”

IV. How do we detect it? How to avoid it?


a. Use Updated Antivirus Software
b. Keep the Firewall Enabled – it acts as a barrier that protects your device from data-
based malware threats
- Restart: Windows User: Control Panel > System & Security > Windows Firewall
- For Mac User: System Preferences > Security & Privacy > Enable Firewall
c. Use VPN instead
- Hotspot Security: Private Wifi or Hotspot Shield
- SSL Encryption
d. Verify the Network; Configure and Turn off Sharing

For Private Networks:


a. Use an inconspicuous network name (SSID)
b. Use Enterprise WPA2 with 802.1X authentication
c. Secure the 802.1X client settings
d. Use rogue-AP detection or wireless intrusion prevention

V. Safety Tips and Precautions to avoid it from happening to you

DON’Ts
 Allow your Wi-Fi to auto-connect to networks
 Log into any account via an app that contains sensitive information. Go to the website
instead and verify it uses HTTPS before logging in
 Leave your Wi-Fi or Bluetooth on if you are not using them
 Access websites that hold your sensitive information, such as such as financial or
healthcare accounts
 Log onto a network that isn’t password protected

DOs
 Connect to secured public networks whenever possible.
 Use a two-factor authentication
 Disable file sharing
 Only visit sites using HTTPS
 Log out of accounts when done using them
 Use a VPN to make sure your public Wi-Fi connections are made private

References:

WiFi Eavesdropping.
Retrieved August 5, 2019, from https://www.firewalls.com/blog/security-terms/wifi-
eavesdropping/
Warning: These 7 Public Wi-Fi Risks Could Endanger Your Business.
Retrieved August 3, 2019, from https://www.inc.com/comcast/risks-of-using-public-wifi.html
What is Wi-Fi Eavesdropping (MITM) ? (n.d.).
Retrieved August 3, 2019, from https://doubleoctopus.com/security-wiki/threats-and-tools/wi-fi-
eavesdropping
5 Ways to Secure Wi-Fi Networks.
Retrieved August 3, 2019, from https://www.networkworld.com/article/3224539/5-ways-to-
secure-wi-fi-networks.html
The risks of public Wi-Fi.
Retrieved August 1, 2019, from https://us.norton.com/internetsecurity-privacy-risks-of-public-wi-
fi.html
7 safety tips from hackers.
Retrieved August 1, 2019, from https://money.cnn.com/2014/09/22/technology/security/hacker-
safety-tips/

Potrebbero piacerti anche