You are part of a security team at a large corporation. Recently, a colleague asked why there is a policy against using public wireless networks with their company laptops. You explain that hackers use software to steal and analyze network traffic on public wireless networks. To demonstrate your point, you show your colleague how hackers exploit public wireless networks.
Download Wireshark (http://www.wireshark.org/download.html), or any other packet analysis tool.
Configure and use your chosen packet analysis tool to analyze wireless network traffic. Only capture legally permissible traffic such as your own home wireless traffic.
Create a presentation based on your observations.
Include the following in your presentation:
- Screenshots of the steps taken to download, install, and use a packet capture utility.
- Identified unencrypted traffic in captures.
- Identified encrypted traffic in captures, as well as ciphers.
- The differences in encrypted versus unencrypted traffic, as well as available plain text.
Use any slide presentation tool and include detailed speaker notes and citations as needed.