0% found this document useful (0 votes)
96 views

Module 17 Investigating Wireless Attacks

EC-Council CHFI Computer Hacking Forensic Investigator Training v8 Module 17 Investigating Wireless Attacks

Uploaded by

GhostDead
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF or read online on Scribd
0% found this document useful (0 votes)
96 views

Module 17 Investigating Wireless Attacks

EC-Council CHFI Computer Hacking Forensic Investigator Training v8 Module 17 Investigating Wireless Attacks

Uploaded by

GhostDead
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF or read online on Scribd
You are on page 1/ 107
Module 17 Designed by . Presented by Professionals. ‘THOUSANDS of Sydney households are placing their personal information at risk and inadvertently protecting fraudsters and users of cid pornographyby ‘not securing theit home Wi-Fi networks, a Fairfaxinvestigation hasshown. [NSW Police have prosecuted individuals for crimes involving fraud and child ‘exploitation material who were using unsecured wireless internet networks to ‘commit offences, said Bruce Van Der Graaf from the NSW Police fraud squad. [An internet security expert from RMIT University in Melbourne, Mark Gregory, said unsecured Wi-Fi could attract attacks on any devices on the same ‘network, leading to the loss of personal data. The arrest in March of a manin Buffalo, New Yort, by armed immigration and Customs Enforcement agents, ‘who throw him down some stairs and called him a paedophile and Pornographer, highlighted the danger ofleavinga network unsecured. ‘The man’s WEFi router was usedto download thousands of images of child ‘exploitation and it took three days for investigators to establish hisinnocence. His neighbour was later charged with distributing child pornography. Sealed Cee ere aes Wi-Fi Hacking Neighbor Sentenced to 18 Years Barry Ardolf, 45, repeatedly hacked into his next-doorneighbors' Wi-Fi network in 2009, and used it to try and frame them for child pomography, sexual harassment, various kinds of professional misconduct and to send threatening email to politicians, including Vice President Joe Biden. 12003 Natt and Bethany Kostolnik moved in the house nextdoar to Adolf, who at the time was 2 living inthe Minnespolis suburb of Blaine. On their first day st their new home, the Kestolnik’s then-4-year-old son wandered near Ardolf's house. While carrying him back next door, Ardolfallegediy kssec the boy on the lips. ‘The couple reported Ardolf to the police, angering their creepy new neighbor. Ardolf decided to's "by aunching computer attacks gpinst the couple, Ardolt downloaded and spent two weeks cracking the Kostolnils Then he used thelr own Wi Finetwork to create afake MySpace page forthe husband, where he posted a child porn picture. He then emailed the same child pom to fone of the husband's co-workers, andssent flitatious email towomen, in Me Kostolnik’s effice through the husband's genuine email account. [After the husband exolained to his law office superiors that he had no idea what was happening, his bosses hired 2 law firm that and that an" . had access tot. With Kostolniks permission, they installed a on his network to try andget to the bottom of the incidents. Then, in May 2009, the Secret Service showed up at Kostolnit's office to ask about several threatening emails sent from his Yahoo account, and traced to his that were addresced to Biden and other politicians. The subject line of one email read: “I swear to God I'm going to kill oul," part of the message to Biden said, ‘A forensics computer investigator working for Kostolnik’s Law firm. examined the , and found the email sessions sending the threats. In the data surrounding the they found traffic containing Ardol's name and The FBI goto for Ardoit's house and computer, and found reams of Including copies of data swiped from the Kostolniks' computer, and hacking manuals with titles such as tp:/fedtion cnn.com Cay ad deel Cee Reece)

You might also like