Wireless Attacks and Countermeasures
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
>> Hey everyone, welcome back to the course.
00:00
In this video, we're going to talk about
00:00
wireless attacks as well as
00:00
some countermeasures to those attacks.
00:00
Let's talk about our different types
00:00
>> of wireless attacks,
00:00
>> or at least the most common ones.
00:00
We've got an evil twin so this is
00:00
where that attacker sets up
00:00
that fake wireless access point with
00:00
a similar name as we talked about before
00:00
to a corporate access points so for example,
00:00
Starbucks corporate,
00:00
and then maybe set up Starbucks guest
00:00
or Starbucks corporate dot
00:00
Number 1 or something like that.
00:00
Just a similar name to where
00:00
we don't necessarily know as the end-user,
00:00
should we connect to this one
00:00
or this other one over here.
00:00
Like I said, a lot of times they'll boost
00:00
the signal so that way they're
00:00
device shows us the strongest signal
00:00
and you're more inclined to say,
00:00
well, it's a stronger signal,
00:00
must be the corporate one and I should connect to it.
00:00
We've got jamming attacks,
00:00
which is basically just blocking that wireless signal of
00:00
the wireless access point so thinking
00:00
through when we talk about the CIA
00:00
triad earlier in the course,
00:00
thinking through the availability aspect there.
00:00
We've got what's called a honeyspot attach.
00:00
So this is where the attacker sets up
00:00
a wireless access point similar to an evil twin.
00:00
But instead of naming it like
00:00
a corporate thing, this would be one.
00:00
There'll be like a public Wi-Fi place.
00:00
So for example, a Starbucks or
00:00
a restaurant and the attacker will just name
00:00
their device a similar SSID as the public Wi-Fi.
00:00
For example, just using Starbucks,
00:00
Starbucks might say Starbucks
00:00
public and the attacker might use like
00:00
Starbucks_public write something simple that looks very
00:00
similar in nature and with the hope that
00:00
people will connect to that and not use VPNs,
00:00
etc, and allow the attacker to get
00:00
things like login credentials or banking information.
00:00
We've got misconfiguration.
00:00
So this is where the attacker takes
00:00
advantage of default or weak credentials on the device,
00:00
or even default configurations,
00:00
as well as weak encryption
00:00
to compromise that access point.
00:00
Then we've got ad hoc connections.
00:00
This is where the attacker enables
00:00
ad hoc connections in the user system.
00:00
You're doing something like using malware to do so or if
00:00
an employee is already using an ad hoc connection
00:00
to file-sharing sites or whatever with peers,
00:00
then the attacker compromise that
00:00
connection because that particular mode,
00:00
the ad hoc mode, doesn't actually
00:00
provide a very strong encryption.
00:00
What are some countermeasures that we
00:00
can do well using things like
00:00
WPA2 encryption to give us a stronger encryption base,
00:00
not sharing our login credentials.
00:00
Don't open emails that you don't trust.
00:00
So don't fall for phishing emails essentially,
00:00
which can be a little challenging.
00:00
Implementing things like
00:00
intrusion detection systems or firewalls
00:00
and filtering the connections
00:00
to those wireless access points.
00:00
Changing default configurations or
00:00
default credentials to make it
00:00
more difficult for the attacker to get in.
00:00
Using a centralized authentication system
00:00
and of course using a VPN so
00:00
even though we're connected to what we would consider
00:00
our corporate wireless access point.
00:00
We need to use a VPN wherever
00:00
possible to help encrypt the traffic that we're doing.
00:00
So an attacker can just sniff that mac filtering as well.
00:00
So quick quiz question here for you.
00:00
What are some best practices around Wi-Fi?
00:00
Which of the following are included on that?
00:00
Is it using WPA2,
00:00
is it changing the default credentials
00:00
or is it using a VPN?
00:00
This one was pretty simple, right?
00:00
It's obviously all of these.
00:00
We want to use WPA2 or at least stronger encryption.
00:00
We want to change the default credentials as well
00:00
as the default settings,
00:00
and then use a VPN wherever we can.
00:00
In this video, we just talked
00:00
about some of the different wireless attacks
00:00
as well as some of the fundamental
00:00
countermeasures that we can do.
Up Next
Instructed By
Similar Content