Title | 1.0.1.2 Class Activity - Top Hacker Shows Us How It is Done |
---|---|
Course | Studio Project 2 |
Institution | Victoria University |
Pages | 2 |
File Size | 95.1 KB |
File Type | |
Total Downloads | 513 |
Total Views | 908 |
Class Activity – Top Hacker Shows Us How It is DoneObjectivesUnderstand vulnerabilities of wireless and other common technologiesBackground / ScenarioNearly every “secure” system that is used today can be vulnerable to some type of cyberattack.Required Resources PC or mobile device with Internet ac...
Class Activity – Top Hacker Shows Us How It is Done Objectives Understand vulnerabilities of wireless and other common technologies
Background / Scenario Nearly every “secure” system that is used today can be vulnerable to some type of cyberattack.
Required Resources
PC or mobile device with Internet access
Step 1: View the TEDx Video “Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests” a. Click on the link below and watch the Video. Top Hacker Shows Us How It’s Done; Pablos Holman at TEDxMidwests In the video, Mr. Holman discusses various security vulnerabilities concerning systems that are typically considered as secure, however, as he points out in his presentation, they are all vulnerable to attack. b. Choose one of the hacks discussed by Mr. Holman in the video, and using your favorite search engine conduct some additional research on the hack. c.
For the hack chosen in Step 1b, answer the questions below. Be prepared to share your work in a full class discussion.
Step 2: Answer the following questions. a. What is the vulnerability being exploited? Passwords being stolen from a mile away. ____________________________________________________________________________________ ____________________________________________________________________________________ b. What information or data can be gained by a hacker exploiting this vulnerability? The hacker is able to gain access of peoples passwords. He’s able to control peoples Wi-Fi networks via the Bluetooth antenna connected to the fake gun, giving him full control. ____________________________________________________________________________________ ____________________________________________________________________________________ c.
How is the hack performed? _It’s for your long-range password sniffing action, about a mile away It can watch your wireless network. It harvest passwords from any devices connected to that network. __________________________________________________________________________________ ____________________________________________________________________________________
d. What about this particular hack interested you specifically? It has gained my attention, simply because it has a set of unique of tools harvesting passwords from using weapon to shoot out the window and target people’s Wi-Fi. ____________________________________________________________________________________
Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 1 of 2
www.netacad.com
Class Activity – Top Hacker Shows Us How It is Done ____________________________________________________________________________________ e. How do you think this particular hack could be mitigated? This hack can be less lethal, by using short range targets within the area, around a 2 km radius. It has less potential gaining access across towns and cities. ____________________________________________________________________________________ ____________________________________________________________________________________
Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Page 2 of 2
www.netacad.com...