white hat hacking #2
DESCRIPTION
Curs White Hat Hacking, partea a 2-aTRANSCRIPT
![Page 1: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/1.jpg)
![Page 2: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/2.jpg)
salut, din nou.
![Page 3: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/3.jpg)
Tudor Damian
IT Solutions Specialist
tudy
![Page 4: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/4.jpg)
ce facem azi?
![Page 5: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/5.jpg)
curs WHH, #2 Privacy Social Media Wireless Networks
![Page 6: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/6.jpg)
câteva cuvinte despre confidențialitate
![Page 7: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/7.jpg)
”digital imigrants” vs.
”digital natives”
![Page 8: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/8.jpg)
așteptările societății legat de confidențialitate scad vizibil
![Page 9: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/9.jpg)
You have no privacy, get
over it!
Scott McNealy CEO, Sun Microsystems
![Page 10: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/10.jpg)
incidente soldate cu pierderi de date 1 ianuarie 2005 – 23 noiembrie 2009 http://www.privacyrights.org/ar/ChronDataBreaches.htm
![Page 11: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/11.jpg)
![Page 12: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/12.jpg)
![Page 13: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/13.jpg)
![Page 14: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/14.jpg)
adică ~25% din PIB-ul României
![Page 15: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/15.jpg)
sau, tot în România… OALPP* *One Alienware Laptop Per Person
![Page 16: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/16.jpg)
puteți, sau ați vrea să...
![Page 17: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/17.jpg)
aveți o conversație privată, față în față?
![Page 18: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/18.jpg)
mergeți cu mașina din punctul A în punctul B, anonim
![Page 19: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/19.jpg)
zburați cu avionul, anonim?
![Page 20: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/20.jpg)
fiți invizibili într-o mulțime?
![Page 21: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/21.jpg)
...dar să aveți și mobilul pornit?
![Page 22: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/22.jpg)
faceți cumpărături fără să vă dezvăluiți identitatea?
![Page 23: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/23.jpg)
...online?
![Page 24: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/24.jpg)
navigați pe Internet, anonim?
![Page 25: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/25.jpg)
trimiteți un email, anonim?
![Page 26: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/26.jpg)
o definiție pentru confidențialitate
![Page 27: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/27.jpg)
dreptul de a fi lăsat în pace
![Page 28: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/28.jpg)
invadarea intimității
![Page 29: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/29.jpg)
web server
ad server web server
third party cookies
![Page 30: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/30.jpg)
web bugs
![Page 31: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/31.jpg)
![Page 32: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/32.jpg)
![Page 33: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/33.jpg)
![Page 34: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/34.jpg)
![Page 35: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/35.jpg)
$40/an
peste 30.000 americani s-au înscris
![Page 36: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/36.jpg)
mai mult...
![Page 37: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/37.jpg)
log-uri la ISP (configurări, monitorizare) (tot traficul IN/OUT)
![Page 38: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/38.jpg)
backup-uri la ISP (failure recovery) email-uri, atașamente, site-uri
![Page 39: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/39.jpg)
backup/log-uri locale
![Page 40: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/40.jpg)
alte exemple
![Page 41: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/41.jpg)
OnStar, General Motors, SUA
![Page 42: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/42.jpg)
cip-uri RFID (mingi de golf, casino chips, cheile
de la casa/mașină, produse din depozite, implanturi)
![Page 43: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/43.jpg)
smart dust, daft dust, golem dust emițător/receptor de presiune,
temperatură, sunet
![Page 44: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/44.jpg)
două aspecte esențiale
![Page 45: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/45.jpg)
ambele se asigură că informația ajunge doar la persoanele autorizate
![Page 46: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/46.jpg)
1. confidențialitate
![Page 47: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/47.jpg)
mecanism principal: criptare
![Page 48: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/48.jpg)
criptarea nu poate preveni intercepția
![Page 49: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/49.jpg)
2. posesie
![Page 50: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/50.jpg)
mecanism principal: access control
![Page 51: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/51.jpg)
posesia nu poate oferi secretizare
![Page 52: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/52.jpg)
de reținut!
![Page 53: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/53.jpg)
PETs (privacy-enabling technologies)
și
PATs (privacy-aware technologies)
![Page 54: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/54.jpg)
confidențialitate (criptare)
și
posesie (access control)
![Page 55: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/55.jpg)
clasificarea datelor
colectare, retenție, recuperare
![Page 56: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/56.jpg)
lucrul cu informația
ce se colectează? cum circulă?
unde e stocată, și pentru cât timp? cine o acesează și de ce?
ce se întâmplă în afara sistemului? când e distrusă?
![Page 57: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/57.jpg)
ajungem la social media security
sursa: bogdanatheplanner.blogspot.com - twitter.com/Bogdana
![Page 58: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/58.jpg)
rețelele sociale
![Page 59: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/59.jpg)
(app) “one can tell more about a person from fumbling through his things for 10 minutes
than from a 1 hour conversation”
Malcolm Gladwell, Tipping Point
![Page 60: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/60.jpg)
![Page 61: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/61.jpg)
rețelele sociale sunt un fel de ”jurnal 24/7” al detaliilor intime
![Page 62: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/62.jpg)
exemplu: facebook
![Page 63: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/63.jpg)
![Page 64: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/64.jpg)
cum puteți fi expuși?
![Page 65: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/65.jpg)
primiți răspunsuri, sunt adăugate tag-uri cu voi, primiți comentarii, (nu) sunteți adăugați în listele de prieteni, (nu) vi se trimit lucruri, publicați update-uri, imagini, muzică, link-uri, comentați link-urile, poze și update-urile altora, vă alăturați unor cauze, deveniți prieteni cu altcineva, vă modificați profilul, marcați
lucruri care vă plac, (nu) răspundeți altora
![Page 66: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/66.jpg)
awfulfacebookstatuses.blogspot.com
![Page 67: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/67.jpg)
ce spun update-urile despre voi
![Page 68: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/68.jpg)
dacă sunteți la birou, cât din timp NU lucrați, pe ce site-uri intrați, de cine (nu) vă place, cu cine ați făcut
sau ați vrut să faceți sex, unde vă veți petrece vacanța, și cu cine (nu), pe cine încercați să lingușiți, ce încercați să promovați legat de imaginea voastră,
în ce credeți, ce fel de colegi/șefi sunteți, etc...
![Page 69: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/69.jpg)
implicații
![Page 70: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/70.jpg)
viața privată relații cu prietenii
viața amoroasă
viața publică opinii politice
preferințe religioase
viața profesională angajare / job nou
relațiile cu colegii
![Page 71: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/71.jpg)
ce e public și ce e (semi) privat?
coduri de conduită atât pentru deținătorii rețelelor sociale, cât și pentru utilizatori
nevoia de a reglementa procesele
utilizarea etică/morală a informației
profile demografice (marketing, reclame)
self-awareness
![Page 72: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/72.jpg)
și nu în ultimul rând, securitatea
![Page 73: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/73.jpg)
exemplu: KOOBFACE
sursa:
![Page 74: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/74.jpg)
![Page 75: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/75.jpg)
Hacking Wireless Networks
![Page 76: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/76.jpg)
începem cu un scurt istoric
![Page 77: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/77.jpg)
1999: 802.11a & 802.11b
![Page 78: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/78.jpg)
ulterior: 802.11g
![Page 79: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/79.jpg)
acum: 802.11n
![Page 80: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/80.jpg)
termeni
![Page 81: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/81.jpg)
access point (AP) dispozitiv atașat rețelei cu fir, care oferă acces wireless utilizatorilor
![Page 82: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/82.jpg)
infrastructure (Basic Service Set)
![Page 83: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/83.jpg)
ad-hoc (Independent Basic Service Set)
![Page 84: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/84.jpg)
(extended) service set o serie de AP-uri care lucrează la
unison pentru a oferi acces
![Page 85: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/85.jpg)
SSID string care identifică un service set
![Page 86: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/86.jpg)
BSSID adresa MAC a AP-ului
![Page 87: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/87.jpg)
frame (datele transmise fizic)
![Page 88: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/88.jpg)
WEP Wired Equivalent Privacy
![Page 89: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/89.jpg)
WPA/WPA2 Wi-Fi Protected Access
![Page 90: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/90.jpg)
tipuri de frame-uri
![Page 91: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/91.jpg)
management (MGMT) access control (autentificare, asociere) media detection (beaconing, probing)
![Page 92: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/92.jpg)
DATA transmitere de informații
spre sau dinspre AP
![Page 93: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/93.jpg)
control (CTRL) confirmă primirea frame-urilor, rezervă echipamentele pentru schimburi lungi de frame-uri
![Page 94: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/94.jpg)
cum funcționează?
![Page 95: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/95.jpg)
clientul se autentifică la un service set
![Page 96: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/96.jpg)
cheia e fie (pre)shared, fie nu se folosește
![Page 97: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/97.jpg)
autentificarea se face înainte de acces, nu în timpul accesului!
![Page 98: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/98.jpg)
clientul se asociază unui AP
![Page 99: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/99.jpg)
clientul se dezasociază de la un AP, și se reasociază la altul pe măsură ce se
deplasează
![Page 100: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/100.jpg)
cum funcționează WEP?
![Page 101: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/101.jpg)
WEP = Wired Equivalent Privacy
![Page 102: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/102.jpg)
ar trebui să fie ”What on Earth does this Protect?!”
![Page 103: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/103.jpg)
criptează doar DATA frames, nu și MGMT și CTRL frames
![Page 104: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/104.jpg)
sunt tool-uri care pretind că pot decripta o cheie WEP folosind între 5
și 10 milioane de pachete
![Page 105: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/105.jpg)
de fapt sunt suficiente 250.000
![Page 106: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/106.jpg)
video
![Page 107: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/107.jpg)
nu vă bazați pe WEP pentru securitate
![Page 108: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/108.jpg)
tehnologia wireless – vești bune
![Page 109: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/109.jpg)
e ieftină
![Page 110: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/110.jpg)
e ușor de implementat
![Page 111: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/111.jpg)
nu ține cont de parametrii fizici ai clădirilor
![Page 112: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/112.jpg)
tehnologia wireless – vești proaste
![Page 113: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/113.jpg)
e ieftină
![Page 114: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/114.jpg)
e ușor de implementat
![Page 115: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/115.jpg)
nu ține cont de parametrii fizici ai clădirilor
![Page 116: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/116.jpg)
de ce ”wireless hacking”?
![Page 117: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/117.jpg)
acces aproape anonim
![Page 118: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/118.jpg)
un ”wireless hacker” e greu de identificat și urmărit
![Page 119: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/119.jpg)
motive pur tehnice, care fac rețelele wireless mai ”atractive”
![Page 120: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/120.jpg)
valorificarea oportunităților
![Page 121: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/121.jpg)
folosire rău-intenționată
![Page 122: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/122.jpg)
ce ar trebui să știe un atacator?
![Page 123: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/123.jpg)
frame-urile de MGMT și CTRL nu sunt criptate
![Page 124: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/124.jpg)
pot fi generate chiar și fără a cunoaște cheia WEP
![Page 125: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/125.jpg)
autentificare slabă a stațiilor de lucru
![Page 126: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/126.jpg)
ușurință în a obține acces la mediul wireless
![Page 127: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/127.jpg)
autentificare AP-stație inexistentă
![Page 128: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/128.jpg)
nu există metode prin care să știm dacă un AP e ”legitim”
![Page 129: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/129.jpg)
număr limitat de stații care pot folosi un singur AP
![Page 130: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/130.jpg)
se poate ”supraaglomera” un AP, blocând astfel accesul
![Page 131: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/131.jpg)
toate problemele sunt localizate la nivel de MAC
![Page 132: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/132.jpg)
nu putem lansa astfel de atacuri decât din aria de acoperire a AP-ului
![Page 133: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/133.jpg)
descoperirea rețelelor wireless
![Page 134: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/134.jpg)
wardriving
![Page 135: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/135.jpg)
laptop sau PDA, antenă externă, GPS, power inverter, scanning
software, mapping software, mașină
![Page 136: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/136.jpg)
![Page 137: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/137.jpg)
warchalking
![Page 138: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/138.jpg)
la noi destul de puțin răspândit
![Page 139: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/139.jpg)
![Page 140: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/140.jpg)
”accesarea” rețelelor wireless
![Page 141: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/141.jpg)
tipuri de atacuri
![Page 142: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/142.jpg)
insertion attacks (introducerea de echipamente
”străine” sau de rețele noi)
![Page 143: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/143.jpg)
intercepție și monitorizare neautorizată (spre deosebire de rețelele pe fir, în
WLAN se vede tot traficul)
![Page 144: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/144.jpg)
bruiaje (jamming) pe 2.4 Ghz
![Page 145: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/145.jpg)
brute-force pe parola AP-ului
![Page 146: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/146.jpg)
configurări greșite sau implicite
![Page 147: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/147.jpg)
encryption attacks atacuri pe chei de criptare
![Page 148: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/148.jpg)
denial of service (DoS) dezasocieri, prea multe asocieri,
multe beacon frames
![Page 149: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/149.jpg)
session hijacking de obicei cu ”MAC spoofing”
![Page 150: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/150.jpg)
atacuri man-in-the-middle spre exemplu, ARP poisoning
![Page 151: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/151.jpg)
un atac pas cu pas
![Page 152: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/152.jpg)
pasul 1: găsim rețeaua
![Page 153: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/153.jpg)
folosim NetStumbler, Kismet, etc.
![Page 154: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/154.jpg)
găsim un AP cu semnal puternic
![Page 155: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/155.jpg)
wardriving
![Page 156: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/156.jpg)
pasul 2: alegem rețeaua
![Page 157: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/157.jpg)
cel mai probabil rețeaua unei firme
![Page 158: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/158.jpg)
să zicem că SSID = HackMePls
![Page 159: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/159.jpg)
vedem dacă rețeaua e sau nu securizată
![Page 160: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/160.jpg)
pornim Wireshark pentru a obține mai multe informații
![Page 161: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/161.jpg)
pasul 3: analizăm rețeaua
![Page 162: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/162.jpg)
WLAN-ul ales nu are SSID public
![Page 163: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/163.jpg)
nu e o problemă, frame-urile de MGMT și CTRL conțin și SSID-ul
![Page 164: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/164.jpg)
mai multe AP-uri
![Page 165: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/165.jpg)
mulți utilizatori activi
![Page 166: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/166.jpg)
protecție = cheie WEP de 128 biți
![Page 167: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/167.jpg)
nu se folosește 802.1x (WEB-auth)
![Page 168: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/168.jpg)
pasul 4: găsim cheia WEP
![Page 169: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/169.jpg)
setăm placa în mod de monitorizare (promiscuous mode)
![Page 170: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/170.jpg)
începem captura de pachete
![Page 171: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/171.jpg)
eventual folosim ARP injection
![Page 172: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/172.jpg)
după câteva minute/ore, avem suficiente pachete
![Page 173: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/173.jpg)
”obținem” cheia WEP folosind una din metodele cunoscute
![Page 174: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/174.jpg)
pasul 5: ”sniffing” pe rețea
![Page 175: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/175.jpg)
odată ce avem cheia WEP, we’re in!
![Page 176: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/176.jpg)
avem IP intern, avem acces la rețea
![Page 177: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/177.jpg)
totuși, accesul la internet se face printr-un proxy securizat cu SSL
![Page 178: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/178.jpg)
începem monitorizarea traficului din rețea
![Page 179: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/179.jpg)
pasul 6: continuăm cu ”sniffing”
![Page 180: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/180.jpg)
toate sistemele dintr-un WLAN sunt peers, deci ”sniffing” e foarte util
![Page 181: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/181.jpg)
”ascultăm” conexiunile cu protocoale plain text (FTP, Telnet, ...)
![Page 182: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/182.jpg)
într-o oră obținem 3 login-uri valide
![Page 183: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/183.jpg)
ce am obținut?
![Page 184: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/184.jpg)
acces complet la WLAN
![Page 185: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/185.jpg)
acces complet la wired LAN
![Page 186: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/186.jpg)
acces complet la Internet
![Page 187: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/187.jpg)
acces la serverele interne folosind conturile găsite
![Page 188: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/188.jpg)
anonimitate (parțială) unele tool-uri pot fi detectate
![Page 189: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/189.jpg)
alte posibilități
![Page 190: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/190.jpg)
exploatarea unei vulnerabilități cunoscute în proxy (dacă există)
![Page 191: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/191.jpg)
atac DoS sau hijack asupra unui alt user, folosind adresa MAC și IP-ul
![Page 192: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/192.jpg)
ambele prezintă un risc mai mare de a fi detectat, ceea ce nu e de dorit
![Page 193: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/193.jpg)
securizarea unei rețele wireless
![Page 194: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/194.jpg)
C.I.A.
![Page 195: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/195.jpg)
nu, nu e vorba de o agenție guvernamentală din SUA
![Page 196: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/196.jpg)
Confidentiality, Integrity, Availability
![Page 197: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/197.jpg)
probleme care pot apărea
![Page 198: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/198.jpg)
atacuri ”fizice”
![Page 199: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/199.jpg)
dezvăluirea informației
![Page 200: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/200.jpg)
atacuri DoS
![Page 201: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/201.jpg)
utilizatori
![Page 202: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/202.jpg)
wireless malware
![Page 203: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/203.jpg)
prejudecăți comune
![Page 204: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/204.jpg)
prejudecăți comune
![Page 205: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/205.jpg)
atacurile DoS cer echipamente scumpe, greu de obținut
![Page 206: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/206.jpg)
separarea WLAN-ului elimină riscul expunerii
![Page 207: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/207.jpg)
suntem în siguranță dacă folosim criptare
![Page 208: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/208.jpg)
ne protejează firewall-ul
![Page 209: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/209.jpg)
nimeni nu vrea să ne atace pe noi
![Page 210: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/210.jpg)
soluții ”fizice”
![Page 211: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/211.jpg)
reducerea nivelului semnalului (poziționarea AP-ului, antene direcționale, limitarea puterii semnalului, vopsea specială)
![Page 212: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/212.jpg)
limitarea accesului fizic în clădiri (mai ales in Data Center)
![Page 213: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/213.jpg)
monitorizarea accesului pe proprietate (alertarea serviciului de pază, photo ID,
testarea periodică a securității)
![Page 214: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/214.jpg)
soluții (tehno)logice
![Page 215: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/215.jpg)
schimbarea setărilor implicite pe AP-uri
![Page 216: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/216.jpg)
adăugarea de parole la toate dispozitivele
![Page 217: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/217.jpg)
alocarea unui nume care să nu identifice compania/firma
![Page 218: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/218.jpg)
nu activați Remote Management pe AP-uri
![Page 219: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/219.jpg)
dezactivarea DHCP
![Page 220: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/220.jpg)
folosirea criptării (WPA/WPA2/802.1x)
![Page 221: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/221.jpg)
upgrade de firmware
![Page 222: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/222.jpg)
dezactivarea facilităților nefolosite
![Page 223: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/223.jpg)
firewall între WLAN și restul rețelei
![Page 224: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/224.jpg)
criptarea datelor intern (IPSec)
![Page 225: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/225.jpg)
resurse online
![Page 226: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/226.jpg)
din nou, fără link-uri
![Page 227: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/227.jpg)
întrebări
![Page 228: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/228.jpg)
mulțumesc.
![Page 229: White Hat Hacking #2](https://reader034.vdocuments.mx/reader034/viewer/2022042521/5560b7fed8b42af93b8b4c53/html5/thumbnails/229.jpg)
Tudor Damian
IT Solutions Specialist
tudy