If you suspend your transcription on amara.org, please add a timestamp below to indicate how far you progressed! This will help others to resume your work!
Please do not press “publish” on amara.org to save your progress, use “save draft” instead. Only press “publish” when you're done with quality control.
You will learn about three of the most common attacks against computer network security. In each of these scenarios, a victim's communication can be monitored and modified at a total loss of privacy. By learning how these attacks are executed, you can defend yourself better.
ARP Spoofing is used to claim any IP address on a local network. This can be the address of the victim's computer or that of the router. I will show you how the possibilities of attacking in both directions.
DNS Hijacking is a technique to monitor or modify the victim's queries on the Internet Domain System. Even when using encrypted protocols like HTTPS, privacy is at risk. With this scenario, you can apply a number of attacks I will present.
Rogue Access Points on a wireless network are harmful on another layer than previously inspected. In probably most of the installations out there, the attacker can easily add a malicious access point to intercept traffic. I will give some short intro into wi-fi and its protocol design.
Hopefully, you can use this knowledge to protect your own privacy and that of others. With these examples, you will at least get some valuable insight into an area that is the playground of the most commonly known type of hackers.
Only basic knowledge about network protocols is expected.