<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>B&#039;Cognizance &#187; IT Vulnerability</title>
	<atom:link href="http://bcognizance.iiita.ac.in/archive/jan-jun14/?cat=9&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://bcognizance.iiita.ac.in/archive/jan-jun14</link>
	<description></description>
	<lastBuildDate>Thu, 13 Nov 2014 09:03:12 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Francophoned Attack</title>
		<link>https://bcognizance.iiita.ac.in/archive/jan-jun14/?p=350</link>
		<comments>https://bcognizance.iiita.ac.in/archive/jan-jun14/?p=350#comments</comments>
		<pubDate>Tue, 15 Apr 2014 03:34:36 +0000</pubDate>
		<dc:creator>utkarsh</dc:creator>
				<category><![CDATA[IT Vulnerability]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/jan-jun14/?p=350</guid>
		<description><![CDATA[Social Engineering is the art of convincing People to reveal confidential information. It is depend on fact that people are unaware of their valuable information and are careless about protecting it. In the similar way Francophoned is type of sophisticated Social Engineering Attack.  In April 2013, In a French based multinational company received an email<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/jan-jun14/?p=350" title="Read Francophoned Attack">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Social Engineering is the art of convincing People to reveal confidential information. It is depend on fact that people are unaware of their valuable information and are careless about protecting it.</p>
<p>In the similar way Francophoned is type of sophisticated Social Engineering Attack.  In April 2013, In a French based multinational company received an email to an invoice hosted on a popular file sharing service by the administrative assistant to a vice president ,a few minutes later, the same  administrative received a phone call from another vice-president within the  company ,instructing her to examine and process the invoice. The vice president spoke with authority and used perfect French. However, the invoice was fake and the vice president who called her was an attacker.</p>
<p>The Invoice was actually a Remote Access Trojan (RAT) that was configured to Command and Control server located in Ukraine. The tactics like email followed by Phone call and using French, are sign of aggressive social Engineering.</p>
<p><strong>Social Engineering Tactics Used in Francophoned Attack</strong></p>
<ul>
<li>Firstly the attacker compromised the systems using RAT.</li>
<li>Once the systems were compromised using RAT, after that retrieved identifying information and necessary confidential information.</li>
<li>Using the retrieved data the attacker was able to impersonate as authorize representative and called to telecom provider of the organization’s and proved his/her authenticity to the telecom provider, and said that they needed all of the organization phone numbers to be redirected to attacker-controlled phones.</li>
<li>Immediately after the phone number redirection,the attacker faxed a request to the organization’s bank, requesting multiple large-sum wire transaction to numerous offshore accounts.</li>
<li>As this was unusual transaction, the bank representive called the organization’s number on record to validate the transaction. This called redirected to the attacker who approved the transaction.</li>
<li>The funds had transferred through multiple accounts, which were later laundered through other accounts and monetary instruments.</li>
</ul>
<blockquote><p><strong><i>Abhishek Rai<br />
IMS2013017<i></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/jan-jun14/?feed=rss2&#038;p=350</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Evil Twin AP</title>
		<link>https://bcognizance.iiita.ac.in/archive/jan-jun14/?p=368</link>
		<comments>https://bcognizance.iiita.ac.in/archive/jan-jun14/?p=368#comments</comments>
		<pubDate>Tue, 15 Apr 2014 03:33:30 +0000</pubDate>
		<dc:creator>utkarsh</dc:creator>
				<category><![CDATA[IT Vulnerability]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/jan-jun14/?p=368</guid>
		<description><![CDATA[Evil Twin AP is confidentiality based attack to wireless users on public and Private WLANs. It is a phony wireless Access Point that pretends to be a legitimate Access Point by advertising the respective WLAN’s name (that is SSID). KARMA tool is used for monitoring station probes, looking for commonly used SSID’s and adopting one<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/jan-jun14/?p=368" title="Read Evil Twin AP">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>Evil Twin AP is confidentiality based attack to wireless users on public and Private WLANs.</p>
<p>It is a phony wireless Access Point that pretends to be a legitimate Access Point by advertising the respective WLAN’s name (that is SSID). KARMA tool is used for monitoring station probes, looking for commonly used SSID’s and adopting one as its own. On the other hand those APs that do not send SSIDs in beacons can be monitored and identified by using Wireshark, Kismet or another WLAN analyzer.</p>
<p><strong> Why an AP that uses someone else’s SSID dangerous? </strong></p>
<p>Wireless station generally connects to any AP with a given SSID. In the worse, many station automatically reconnect to any SSID used in the past. By placing an Evil Twin near  business users can be enough to trick their wireless devices to associated with a phony AP. Even sometime an attacker who gets impatient waiting for users to roam to the Evil Twin can use tool like Airplay to deauthenticate everyone, forcing immediate reassociation.</p>
<p>Once the Legitimate users connected to an Evil Twin, can use its vantage point to launch many other attacks. For example, any web request can be redirected to the local host through DNS spoofing. A Man in Middle tool like Dsniff that can compromised SSL or SSH sessions by posing as Target Server.</p>
<p><strong>How to Stop these Attacks?</strong></p>
<ul>
<li>By educating users who are readily connect to any AP to obtain free access of internet, without know to who might own that AP or how that AP may trick them into disclosing Sensitive Data.</li>
<li>Explain them not to accept SSH public keys or SSL server certificates blindly, and the potential consequences of doing so.</li>
<li>In the organizations provide your users with tools that detect or better yet ,prevent unauthorized wireless connection. For Example:</li>
<li>Use Intrusion detection System to spot or block policy associations.<strong> </strong></li>
<li>Prevent users from adding unsecured wireless network entries.<strong></strong></li>
<li>Supply mobile users with secure hotspots client to avoid web page login.</li>
<li>Educate users about options for using 802.1X in home WLANs.</li>
</ul>
<p>However there are many steps that can be helpful to evade Evil Twins, but it may not be practical to eliminate all risks.</p>
<blockquote><p><strong><i>Nitin Pandey<br />
Company &#8211; Innodata Noida<i></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/jan-jun14/?feed=rss2&#038;p=368</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
