● Malicious Wi-Fi Attacks:
When using unknown Wi-Fi networks, be aware of the risks. Hackers can use devices, like Hak5's Pineapple, to create fake networks, capturing data.
Possible Attacks:
- Evil Twin/AP Spoofing:
- How it works: Hackers create fake Wi-Fi networks by imitating legitimate ones.
- Protection: Avoid unknown connections; Always check the authenticity of the network.
- Man-in-the-Middle (MitM):
- How it works: Communication interception, allowing data manipulation.
- Protection:Use HTTPS, VPNs on public networks.
- Phishing:
- How It Works: Hackers trick users into revealing information.
- Protection: Be wary of suspicious emails; avoid clicking on dubious links.
- DNS Spoofing and SSL Strip:
- How it works: Redirection and decryption of secure connections.
- Protection: Use reliable DNS servers, check secure connections (HTTPS).
- Deauthentication/Disassociation Attack:
- How it works: Forced disconnection of devices.
- Protection: Keep your device updated, avoid public Wi-Fi.
● Beware of Suspicious QR-Codes:
- Fake Wi-Fi Hotspot:
- How it works: Hackers create QR-Codes to access fake networks to capture data.
- Protection: Avoid unknown hotspots; disable Wi-Fi when not necessary.
- Fraudulent Promotions and QR-Codes:
- How it works: QR-Codes lead to phishing.
- Protection: Be wary of suspicious promotions; avoid scanning untrusted QR-Codes.