Evil Twin<br />VasileIonutCraciun<br />
<ul><li>What is it?
How does it works
Methods of phishing
Demo
Questions</li></ul>Overview<br />
Psishing<br />Man in the middle<br />Wireless networks<br />What is it<br />
Rogue Wi-Fi access point<br />Connection Diagram<br />
Upcoming SlideShare
Loading in …5
×

Evil twin

276
-1

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
276
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Evil twin

  1. 1. Evil Twin<br />VasileIonutCraciun<br />
  2. 2. <ul><li>What is it?
  3. 3. How does it works
  4. 4. Methods of phishing
  5. 5. Demo
  6. 6. Questions</li></ul>Overview<br />
  7. 7. Psishing<br />Man in the middle<br />Wireless networks<br />What is it<br />
  8. 8. Rogue Wi-Fi access point<br />Connection Diagram<br />
  9. 9. Fake DNS Server<br />Fake Web Server<br />Sniffing<br />Modify Traffic<br />Methods<br />
  10. 10. Use end to end encryption<br />VPN on company networks<br />Awareness<br />Protection<br />
  11. 11. If allowed<br />Demo<br />
  12. 12. Questions?<br />?<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×