Wireless Spoofing Attacks on Mobile Devices

Slides:



Advertisements
Similar presentations
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Advertisements

Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Hacking Presented By :KUMAR ANAND SINGH ,ETC/2008.
Network Attacks Mark Shtern.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Threats To A Computer Network
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Quiz Review.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Protecting Yourself Online (Information Assurance)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Reliability & Desirability of Data
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
PREPARED BY: SYAIDATUL SYAZANA BT PAUZI INTRODUCTION What is the definition of Phishing Hacking.
CHAPTER 9 Sniffing.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Topic 5: Basic Security.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Also known as hardware/physi cal address Customer Computer (Client) Internet Service Provider (ISP) MAC Address Each Computer has: Given by NIC card.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
Network System Security - Task 2. Russell Johnston.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
Security Risks Todays Lesson Security Risks Security Precautions
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Protecting the Server and Client
What they are and how to protect against them
Go to youtube and search “Code.org internet videos”
Done by… Hanoof Al-Khaldi Information Assurance
Hotspot Shield Protect Your Online Identity
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Instructor Materials Chapter 6 Building a Home Network
Identity theft vector of the electronic age
Ways to protect yourself against hackers
Overview 1. Phishing Scams
Wireless Network Security
Security Fundamentals
PPP – Point to Point Protocol
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
Security of a Local Area Network
Lesson 2- Protecting Yourself Online
Man-in-the-Middle Attacks
CS4622: Computer Networking
Network Security: IP Spoofing and Firewall
Topic 5: Communication and the Internet
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Network Models, Hardware, Protocols and number systems
Firewalls Routers, Switches, Hubs VPNs
Network Hardware and Protocols
ARP Spoofing.
Lesson 2- Protecting Yourself Online
Security in mobile technologies
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Communicating in the IT Industry
Created by:- Sailesh Mathur School:- k.v.5 Jaipur
Unit 6.10 – L3 Internet Security
Presentation transcript:

Wireless Spoofing Attacks on Mobile Devices By: Leon Antony IASP -470 Professor Dr.Yoon

Introduction Millions of people connect to free Wi-Fi without knowing the risk. On mobile devices the auto – connect feature is always on searching for a network with no authentication to connect. Not every network that is broadcast on Wi-Fi on the mobile device is secure and official. This spoofing method is just another tool trick the victim into joining their network.

Definition of Spoofing The word spoof is defined as to trick, hoax and deceive someone. This is also true as a network security term but in more detail. Spoofing is illegal practice in which communication is sent from unknown source disguised as source known to the receiver.

The Types of Spoofing Attacks IP Spoofing IP spoofing-attack sends IP packets from a fake source address to hide itself. The first method is to send multiple packs to the victim which the victim is unable to handle. The other method is mimicking the IP address of the target and sending multiple packets to multiple recipients on the network.

The Types of Spoofing Attacks DNS Spoofing In a Domain Name System attack the attack controls and modifies the DNS server in order to reroute the user accessing a specific domain name to a different IP address. The DNS server attacks used to spread computer worms and viruses changing DNS server of common URLs, email addresses and other domain names.

The Types of Spoofing Attacks ARP Spoofing An ARP Spoofing attack is data intended for the host IP address getting sent to the attacker instead. This is accomplished by hacker sending spoof ARP messages across the Host network in order to link the attack MAC address with a member of the current local network

Accessing Spoofing Network 1. Capture your account’s user ID and passwords. 2. Log the data of online traffic accessed on your phone or computer. In this way, they can maintain a data of the websites you mostly visit, and plan attack from these websites. 3. Gain access to your computer, its network and data. 4. Launch a spam or malware attack on your device. 5. Hijack the account you are logged into, and use it for unscrupulous purpose. 6. Redirect you to a phishing webpage where you might give away your personal information.

Solution Packet filters inspects the transmitted packets over the network which allows it block packets with conflicting address. Transport Layer Security (TLS), Secure Shell(SSH) and HTTP Secure(HTTPS) will prevent spoofing attacks by encrypting data before it is sent and authenticating the data as it is received.

Conclusion “Spoofing is a global issue, though American organizations are key targets. U.S. controlled internet protocol addresses are responsible for 25 to 29 percent of known spoofing attacks”. When an individual connects to WI-FI you should be cautious. An example of this is when individual go to a public place like a library or Starbucks which encourages people to use their Wi-Fi. Users typically use the same username and password for many things and when Wi-Fi is available requires a new account hackers can abuse it. If this is the case always create unique username and password and never provide personal information.