Computer Networking Security Beginners Guide: The Guide to CyberSecurity to Learn through a Top-Down Approach all the Defensive Actions to be taken to Protect yourself from the Dangers of the Network by Morgan Kevin

Computer Networking Security Beginners Guide: The Guide to CyberSecurity to Learn through a Top-Down Approach all the Defensive Actions to be taken to Protect yourself from the Dangers of the Network by Morgan Kevin

Author:Morgan, Kevin [Morgan, Kevin]
Language: eng
Format: epub
Published: 2019-11-23T16:00:00+00:00


Free Wi-Fi networks

The hunting grounds preferred by crackers are free Wi-Fi networks, i.e. not for a fee.

Free Wi-Fi networks are easy to access and there is no risk of being identified.

In fact, in these networks, the cracker can perform a MitM attack "Man in the middle". It consists of letting the bad person think that he is connected to the Wi-Fi, while in reality its data flow passes through the cracker's computer. In turn, the cracker, after checking and recording this data, passes it on to the hotspot, making the person who happened to be connected directly to the Wi-Fi network believe he is.

The worst case is when the hotspot is under the control of the cracker or even was created by it to attack all those who will connect. In this case, the cracker has control of the router. A trap of this kind is called a "honeypot".

There are also hardware devices capable of intercepting devices that try to connect to the free Wi-Fi network, and that respond to the connection attempt by pretending to be the desired network.

Finally, it is possible that they will connect to the network computers already infected with malware and will try to transmit the virus to all other connected terminals.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.