preview

Nt1310 Unit 3 Assignment 1 Term Paper

Decent Essays

3.4.1
In general, wireless routers control access to their management interface by using the hypertext transport protocol (HTTP) as the default authentication protocol. In other words, when you connect to your wireless router from a web browser (typically http://192.168.1.1), and then submit your login credentials, the HTTP protocol is used to transmit your login credentials to the router. Because HTTP does not provide encryption, your login credentials are sent to the router over the air in clear-text. In this case, an attacker eavesdropping on your WLAN would be able to capture this information and use it to access the router as an administrator. Once your router is compromised an attacker can then use it to stage attacks such as man-in-the-middle (MITM), modify unencrypted data, or even send users to evil twin websites. To avoid this type of catastrophe, the router’s default authentication method should be changed from HTTP to hypertext protocol with secure sockets layer (or …show more content…

For example, if a user exceeds a certain number of failed login attempts the system will either lock the user out of the system or prevent any future attempts for a specified period of time. Although an account lockout policy is designed to take time away from the attacker, so that the brute force attack will fail, this is only true if the attack is performed on an online database. For example, if the user account’s database is copied to a flash drive, and thus taken offline, the attacker could then perform brute force attacks on the copied database from their own home, bypassing your security policies all together. [explain how a hacker could accomplish this copy to a flashdrive] As a result, once the attacker discovers the password they could then impersonate (or masquerade) as an authorized user, thereby gaining access to systems with certain

Get Access