SSL strip with http and https
I used Wireshark to set up a wireless network. A Cisco wireless access point has 12 access points as indicated in the IEEE 802.11a standard. When choosing what channel to use it is possible to use Wireshark to determine how much latency time there is in a channel. Some protocols take longer than other protocols and use the network more intensively. A few years ago, I was using a wireless bridge at a church to connect the main building and a second building. We were wondering why a computer could access a web page but could not access our SQL server. We used Wireshark to determine that the SQL protocols are more intensive than web traffic.
I have played around with SSL strip and noticed that either adds or replaces http with https or the reverse. For example, should a person log into Facebook with http instead of https we can get access to what they send across as their password. The lock item appears so they believe that they are sending out through an encrypted channel to the server when they in fact are not.
In addition, another aspect that is difficult for network administrators particularly on large campuses such as hospitals are rogue wireless access points that employees put into a production environment. There is a way to log into the controller and seeing what access points the software believes to be rogue and do a denial-of-service attack against the access point to block your users from being able to access the network. However, for this to work, it is advised to make sure that one is sure that the access point is really attached to your network and not to another network. Sometimes the correction of a security issue can create other problems. For example, imagine that a person is using a hotspot on their phone while their phone is connected to a company’s wireless access point. For example, as a helpdesk specialist I encountered this at one of our blood donations sites. Wireshark is an essential tool because it helps network administrators define what normal activities look like and decide how many DNS redirections are permissible.
Reference
Hoffman, H. (2020). HUGO HO
Comments
Post a Comment