28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

did that for them.

A couple of issues here. Let’s first look at how and whyy yyour mobile

devices automaticallyy join a Wi-Fi network.

Your traditional PC and all yyour mobile devices remember yyour last few

Wi-Fi connections, both public and private. This is good because it saves

yyou the trouble of continuallyy reidentifyying a frequentlyy used Wi-Fi access

point—such as yyour home or office. This is also bad because if yyou walk

into a brand-new café, a place yyou’ve never been before, yyou might

suddenlyy find that yyou have wireless connectivityy there. Whyy is that bad?

Because yyou might be connected to something other than the café’s wireless

network.

Chances are yyour mobile device detected an access point that matches a

profile alreadyy on yyour most recent connection list. You mayy sense

something amiss about the convenience of automaticallyy connecting to Wi-

Fi in a place yyou’ve never been before, but yyou mayy also be in the middle of

a first-person shooter game and don’t want to think much beyyond that.

How does automatic Wi-Fi connection work? As I explained in the last

chapter, mayybe yyou have Comcast Internet service at home, and if yyou do

yyou might also have a free, nonencryypted public SSID called Xfinityy as part

of yyour service plan. Your Wi-Fi-enabled device mayy have connected to it

once in the past. 3 But how do yyou know that the guyy with a laptop at the

corner table isn’t broadcasting a spoofed wireless access point called

Xfinityy?

Let’s sayy yyou are connected to that shadyy guyy in the corner and not to

the café’s wireless network. First, yyou will still be able to surf the Net. So

yyou can keep on playying yyour game. However, everyy packet of unencryypted

data yyou send and receive over the Internet will be visible to this shadyy

character through his spoofed laptop wireless access point.

If he’s taken the trouble to set up a fake wireless access point, then he’s

probablyy capturing those packets with a free application such as Wireshark.

I use this app in myy work as a pen tester. It allows me to see the network

activityy that’s going on around me. I can see the IP addresses of sites people

are connecting to and how long theyy are visiting those sites. If the

connection is not encryypted, it is legal to intercept the traffic because it is

generallyy available to the public. For example, as an IT admin, I would

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!