In this video, we're going to be talking about two wireless attacks. You need to know for your exam that there's going to be an evil twin and a rogue access point. Let's get started. So, evil twin, I like this one. This is a pretty cool attack to do against your users. Now, let's say you can't break into somebody's network. You can't get the WPA two keys. Now, WPA Two is almost impossible to crack if they have a complex key. It does use AES encryption. Again, check the encryption section to know why that's so impossible. Now, the evil twin. Here's how this works. So imagine someone going out and setting up a fake access point that mimics the real access point. And then users join the fake access point, thinking it's the real one. So let me give you an example. Let's say you go to Starbucks, right? Starbucks WiFi You go to Starbucks. It's a coffee shop. You're sitting down. You click on the link. You want to get the Internet so you can do some work. You click on the link, you see Starbucks WiFi, and you see Starbucks WiFi. Now you see two wireless networks with the exact same name. So which one is the real one? That one we're not too sure about, right? Because one of them is a real one and one of them is a fake one. So what attackers do is they set up these fake networks that mimic the real networks. When you click on it, you're basicallyin their network, and they can sniff all the traffic coming through their network. Now because you're in anything that's in clear text,such as if you were logging into banking websites, that's still in clear text, emails, anything like that,that's in clear text, you'll be able to sniff the traffic and see all of your data. And then what they do is they can even set up something called a captive portal. Captive portals are basically when you join a wireless network, you get a screen that may ask you to enter information, or you may get a screen that tells you the policy. Think of it when you join, like, a hotel WiFi,where it's like, "Hey, input your room number here, put your last name and your room number, something like that." Imagine you join a wireless network and it prompts you for a key or prompts you for credit card information or passwords. And people just enter it because they think that joining legitimate WiFi, in other words, is stealing the information. Now, is there a tool to do this? I'm going to show you a tool to do it. I covered this more in my ethical hacking classes. I showed them how to set it up. You do need a WiFi card in order to really work in order to set it up. But for your class here, we just need to know exactly what an evil two is. Here's? A quick tool for doing this in Kanye Linuxarrogant is basically the tool that gets this done. It's not hard to set up. It does most of the work for you. It's basically a script that does all the work for you. This year it will do the evil twin for you. It creates the captive port so you can recapture people's keys I thought that was pretty serious stuff there all right. Because think about this. Here's what you can do with a serious tool like this. You can go to Citibank, Chase Bank, or whatever big organisation you roll up next to with a car. You take out your laptop. You set up your little set up going there, and you take the software you created to invite another Citibank wireless network user. They think they're joining the real city bank when they click on your fake one. prompts them for the key. They think they're joining the real one. right? They put in the actual key and before you know it, you have captured the key. Now you can use that key to authenticate to the real Citibank network. The dangerous thing is, the question is, how would you stop this? When joining networks, the best thing to do is never join public networks Your users should be aware that they should only connect to private hotspots, so you would advise them not to connect to any public WiFi, such as that found in a coffee shop or a hotel. The best thing to do would be to carry your own hotspot like on my phone. It does internet sharing on my phone, so I can use this instead of connecting to any public wireless The next attack we'll talk about in this video is going to be something called a rogue access point. Now this one arogue access point is basically an access point that's set up on your network that's actually done without authorization, all right? That's all it is. It's basically somebody setting up an access point on your network without authorization, whether they maliciously did it to circumvent the security of the network or they're doing it because they honestly don't know that they shouldn't be doing that. So imagine you work in an organisation and an employee wants wireless but the company doesn't offer it due to security reasons. The guy goes out to an electronic store and buys an access point. He takes it to the network. He instals it and then he misconfigures it by putting in some easy to crack passwords on theWPA. Before you know it, it opens up a vulnerability in your network. Now this is a person doing it maybe not the intent of breaking the network, but it is a security problem, so a rogue access point is The network is basicallyan access point in your network that is set up without permission. How do you fix it? Well, what you've got to do is to do periodic scans of your wireless network in your vicinity. You've got to scan the network, right? You must scan your network for rogue access points or access points with a strong signal within your physical environment. Then you know there may be a rogue access point. Now, one of the things to remember is to trust no one because you don't know if someone is doing this or not, okay? So scan your network. So, in this video, evil twin, pretty dangerous stuff, I showed you doing that work access point is just an unauthorised access point. You never scan it or define it. And then you want to make sure you get rid of it.
110. Which consideration is important when implementing syslog in a network?Enable the highest level of syslog available to ensure logging of all possible event messages.Synchronize clocks on all network devices with a protocol such as Network Time Protocol.Log all messages to the system buffer so that they can be displayed when accessing the router.Use SSH to access syslog information111. What are the two ways threat actors use NTP? (Choose two.)They place an attachment inside an email message.They attack the NTP infrastructure in order to corrupt the information used to log the attack.They place iFrames on a frequently used corporate web page.They encode stolen data as the subdomain portion where the nameserver is under control of an attacker.Threat actors use NTP systems to direct DDoS attacks.Explanation: Threat actors may attempt to attack the NTP infrastructure in order to corrupt time information used to correlate logged network events. This can serve to obfuscate traces of ongoing exploits. In addition, threat actors have been known to use NTP systems to direct DDoS attacks through vulnerabilities in client or server software. While these attacks do not necessarily result in corrupted security monitoring data, they can disrupt network availability.112. Which two features are included by both TACACS+ and RADIUS protocols? (Choose two.)password encryptionseparate authentication and authorization processesSIP supportutilization of transport layer protocols802.1X supportExplanation: Both TACACS+ and RADIUS support password encryption (TACACS+ encrypts all communication) and use Layer 4 protocol (TACACS+ uses TCP and RADIUS uses UDP). TACACS+ supports separation of authentication and authorization processes, while RADIUS combines authentication and authorization as one process. RADIUS supports remote access technology, such as 802.1x and SIP; TACACS+ does not. 2b1af7f3a8