35C3 ChaosWest - Introduction to Network Security

35C3 ChaosWest - Introduction to Network Security


Learn about the most common attacks against your network privacy - and how to avoid them. By looking at things from an attackers perspective, we can get some insight into technical details that provide us with essential knowledge about network protocols.

You will learn about three of the most common attacks against computer network security. In each of these scenarios, a victim's communication can be monitored and modified at a total loss of privacy. By learning how these attacks are executed, you can defend yourself better.

ARP Spoofing is used to claim any IP address on a local network. This can be the address of the victim's computer or that of the router. I will show you how the possibilities of attacking in both directions.

DNS Hijacking is a technique to monitor or modify the victim's queries on the Internet Domain System. Even when using encrypted protocols like HTTPS, privacy is at risk. With this scenario, you can apply a number of attacks I will present.

Rogue Access Points on a wireless network are harmful on another layer than previously inspected. In probably most of the installations out there, the attacker can easily add a malicious access point to intercept traffic. I will give some short intro into wi-fi and its protocol design.

Hopefully, you can use this knowledge to protect your own privacy and that of others. With these examples, you will at least get some valuable insight into an area that is the playground of the most commonly known type of hackers.

Only basic knowledge about network protocols is expected.



more » « less
Video Language:
Format: Youtube Primary Original
This video is part of Amara Public.

Subtitles download

Incomplete subtitles (1)