ll Lxam Review Group 8 Mel MWSG Network Consulting Congratulations!!! You have j
ID: 3874486 • Letter: L
Question
ll Lxam Review Group 8 Mel MWSG Network Consulting Congratulations!!! You have just been hired on as a Network Specialist by MWSG Network Consuliting The police have asked for the wireless support staff for Melville's Coffee Café to meet with them; you are sent on behalf of MWSG as their representative. Apparently thre Café have had their identity stolen and it seems they were all a November of this year, and they were all using their laptops. was somehow snooping on the customers computers. They have a suspect from the video surveillance e customers of Melville's Coffee t the coffee shop during the first week of the cafe The police suspect someone at camera, but they want to know how the bad guy did it. You take a look at the router at Melville's Coffee Café: it's using Channel 1, has an SSID of MELVILLESCAFE, and the WEP security key is 17 characters long ("AhoyYelandlubbers")! see any issues here? 1. Do you 2. What do you think the method of attack was? 3. Explain how the bad guy did it. 4. The police are confused-why wouldn't the customers have been aware of the attack? 5. What steps will you take to try to ensure the problem stops?Explanation / Answer
Answers)
1. The router at Melville's Coffee Cafe is using SSID of MELVILLESCAFE, and the WEP security key is 17 characters long. The SSID is ok depicting the name of the WiFi network. However it is to be added that the WEP security key approach is quite obsolete and the network and the connected hosts and customers on the network can be hacked onto and information can be stolen as it can be done for any unprotected network.
Also, the WEP key which is 17 characters long here, is quite weak and does not have a minimum combination of alphanumeric characters and numbers. So the password here can be cracked by any person.
2. WEP has major flaws with its design and thus a person with the right tools can break in to the protected network and perform sniffing attacks as on an unprotected network. Here the network may have been hacked also by an outsider by cracking the WEP key and performing sniffing attacks on the connected computers of the network.
3. As already has been said above, the WEP can be cracked easily by the bad guy. After that, you can use a IP sniffer to gain access and steal information about the users who were connected to the network. The bad guy can easily snoop on somebody else's computer in this case and can steal concealed or private data such as their identity as well.
4. The customers cannot be aware of the attacks as they are easy on connected their devices with a wifi connected. And also, the connection was secured. As WEP security is not so effective, the customers wouldn't know the technical know-how that can happen when you connect the computer to the network.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.