SSL strip with http and https

used Wireshark to set up a wireless network.  A Cisco wireless access point has 12 access points as indicated in the IEEE 802.11a standard.  When choosing what channel to use it is possible to use Wireshark to determine how much latency time there is in a channel.  Some protocols take longer than other protocols and use the network more intensively.  A few years ago, I was using a wireless bridge at a church to connect the main building and a second building.  We were wondering why a computer could access a web page but could not access our SQL server.  We used Wireshark to determine that the SQL protocols are more intensive than web traffic. 

I have played around with SSL strip and noticed that either adds or replaces http with https or the reverseFor example, should a person log into Facebook with http instead of https we can get access to what they send across as their password.  The lock item appears so they believe that they are sending out through an encrypted channel to the server when they in fact are not. 

In addition, another aspect that is difficult for network administrators particularly on large campuses such as hospitals are rogue wireless access points that employees put into a production environmentThere is a way to log into the controller and seeing what access points the software believes to be rogue and do a denial-of-service attack against the access point to block your users from being able to access the networkHowever, for this to work, it is advised to make sure that one is sure that the access point is really attached to your network and not to another networkSometimes the correction of a security issue can create other problemsFor example, imagine that a person is using a hotspot on their phone while their phone is connected to a company’s wireless access point.   For example, as a helpdesk specialist I encountered this at one of our blood donations sitesWireshark is an essential tool because it helps network administrators define what normal activities look like and decide how many DNS redirections are permissible. 

Reference 

Hoffman, H. (2020). HUGO HO

Comments

Popular posts from this blog

Open Daylight and OpenFlow

Cancer