This paper will be about the tools and or software that are used to exploit computer systems. I feel that this is a topic that needs to be discussed due to the ever increasing reliance we have with computer technology. I can remember the days when you wanted to learn about a particular subject, you would have to open up encyclopedias, or go to your local library. Now, with the advancements in technology, we have all that wealth of information in the palm of our hand with Smartphones. These devices have become almost like an extension of our selves. They are with us everywhere we go, keeping us connected to a vast network of social media like Facebook, Twitter, and Instagram, as well as access to online video libraries such as YouTube. We can even conduct business while on the go. You no longer have to wait till you get home to get on your computer to take care of your personal banking. As long as you are on your cellular network, or connected to a Wi-Fi hotspot, you can have access to online banking, as well as everything I mentioned above.
Many restaurants, coffee shops, hotels, and even airports offer free Wi-Fi for their customers to connect to. While this is very convenient for all of us, there are risks that we should be aware of when we use these connections. There are malicious users out there who can intercept our Wi-Fi signals when we attempt to connect to these hotspots. I will discuss how they pull off this trick in more detail, as well as what tools they use to make it all happen. Before I go into all that, I would like to point at that, Wi-Fi hotspots and Smartphones aren’t the only ones that are vulnerable to attacks and exploits. Major companies are at risk as well. Think about all the computers and devices that are connected to each other in a major business network. In those networks, there are servers that contain large amounts of data. Every computer, server, or other device that is
References: Anatomy of a Wireless "Evil Twin" Attack (Part 1). (n.d.). Internet Security Solutions. Retrieved November 16, 2013, from http://www.watchguard.com/infocenter/editorial/27061.asp Black Hat: Top 20 hack-attack tools. (n.d.). Network World. Retrieved November 16, 2013, from http://www.networkworld.com/news/2013/071913-black-hat-attack-tools-272025.html Does Your Wi-Fi Hotspot Have an Evil Twin?. (n.d.). PCWorld. Retrieved November 16, 2013, from http://www.pcworld.com/article/120054/article.html Nmap - Free Security Scanner For Network Exploration & Security Audits.. (n.d.). Nmap - Free Security Scanner For Network Exploration & Security Audits.. Retrieved November 16, 2013, from http://nmap.org/ Throwing Star LAN Tap. (n.d.). HakShop —. Retrieved November 16, 2013, from http://hakshop.myshopify.com/products/throwing-star-lan-tap Trojan Horse Attacks. (n.d.). IRCHelp.org — Untitled Page. Retrieved November 16, 2013, from http://www.irchelp.org/irchelp/security/trojan.html USB Rubber Ducky | Home. (n.d.). USB Rubber Ducky | Home. Retrieved November 16, 2013, from http://192.64.85.110/ WiFi Pineapple Mark V Standard. (n.d.). HakShop —. Retrieved November 16, 2013, from http://hakshop.myshopify.com/collections/wifi-pineapple/products/wifi-pineapple Getting Owned: The USB Keystroke Injection Attack. (2013, June 27). > World Views. Retrieved November 16, 2013, from http://www.ciscopress.com/articles/article.asp?p=1636214&seqNum=3 Introduction to Port Scanning. (n.d.). About.com Internet / Network Security. Retrieved November 16, 2013, from http://netsecurity.about.com/cs/hackertools/a/aa121303.htm